Abstract
We seek to develop network algorithms for function computation in sensor networks. Specifically, we want dynamic joint aggregation, routing, and scheduling algorithms that have analytically provable performance benefits due to in-network computation as compared to simple data forwarding. To this end, we define a class of functions, the Fully-Multiplexible functions, which includes several functions such as parity, MAX, and kth-order statistics. For such functions we characterize the maximum achievable refresh rate of the network in terms of an underlying graph primitive, the min-mincut. In acyclic wireline networks we show that the maximum refresh rate is achievable by a simple algorithm that is dynamic, distributed, and only dependent on local information. In the case of wireless networks we provide a MaxWeight-like algorithm with dynamic flow-splitting, which is shown to be throughput-optimal.
Notes
Note that this assumption is not the most general possible restriction on the input process but one that we choose for convenience of exposition. For more general conditions on the arrival process, refer to [13].
Note that such an optimal rate point exists as the min-mincut is a continuous function of the rates which lie in a compact set \(\mathcal {CH}(\varGamma)\).
References
Giridhar, A., Kumar, P.R.: Computing and communicating functions over sensor networks. IEEE J. Sel. Areas Commun. 23(4), 755–764 (2005)
Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)
Orlitsky, A., Roche, J.R.: Coding for computing. IEEE Trans. Inf. Theory 47(3), 903–917 (2001)
Ma, N., Ishwar, P., Gupta, P.: Information-theoretic bounds for multiround function computation in collocated networks. CoRR (2009). arXiv:0901.2356
Kowshik, H., Kumar, P.R.: Optimal computation of symmetric boolean functions in tree networks. In: IEEE International Symposium on Information Theory—ISIT 2010, Austin, July. IEEE Conference Proceedings (2010)
Appuswamy, R., Franceschetti, M., Karamchandani, N., Zeger, K.: Network coding for computing part I: Cut-set bounds. CoRR (2009). arXiv:0912.2820
Moscibroda, T.: The worst-case capacity of wireless sensor networks. In: Internat. Workshop on Inform. Processing in Sensor Networks (IPSN), pp. 1–10 (2007)
Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: Proc. the 26th IEEE Internat. Conf. Distributed Computing Systems (ICDCS), pp. 575–578 (2002)
Karamchandani, N., Keller, L., Fragouli, C., Franceschetti, M.: Function computation via subspace coding. In: Proc. IEEE Int. Symp. Information Theory (ISIT), Austin, July. IEEE Conference Proceedings (2010)
Baek, S.J., de Veciana, G., Su, X.: Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation. IEEE J. Sel. Areas Commun. 22(6), 1130–1140 (2004)
Sharma, A., Golubchik, L., Govindan, R., Neely, M.J.: Dynamic data compression in multi-hop wireless networks. In: Proc. Ann. ACM SIGMETRICS/Performance Conf., pp. 145–156 (2009)
Tassiulas, L., Ephremides, A.: Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans. Autom. Control 4, 1936–1948 (1992)
Andrews, M., Kumaran, K., Ramanan, K., Stolyar, A.L., Vijayakumar, R., Whiting, P.: Scheduling in a queueing system with asynchronously varying service rates. Probab. Eng. Inf. Sci. 14, 191–217 (2004)
Bui, L., Srikant, R., Stolyar, A.L.: Novel architectures and algorithms for delay reduction in back-pressure scheduling and routing. In: Proc. IEEE Infocom, pp. 2936–2940 (2009)
Neely, M.J.: Delay analysis for maximal scheduling with flow control in wireless networks with bursty traffic. IEEE/ACM Trans. Netw. 17(4), 1146–1159 (2009)
Lin, X., Shroff, N., Srikant, R.: A tutorial on cross-layer optimization in wireless networks. IEEE J. Sel. Areas Commun. 24(8), 1452–1463 (2006)
Bui, L., Srikant, R., Stolyar, A.L.: Optimal resource allocation for multicast flows in multihop wireless networks. In: Proc. Ann. ACM SIGMETRICS/Performance Evaluation Review Conf, vol. 35(3), p. 43 (2007)
Lin, L., Shroff, N.B., Srikant, R.: Energy-aware routing in sensor networks: a large system approach. Ad Hoc Netw. 5(6), 818–831 (2007)
Ying, L., Shakkottai, S., Reddy, A.: On combining shortest-path and back-pressure routing over multihop wireless networks. In: Proc. IEEE Infocom, pp. 1674–1682 (2009)
Stolyar, A.L.: Maximizing queueing network utility subject to stability: greedy primal–dual algorithm. Queueing Syst. 50(4), 401–457 (2005)
Jiang, L., Shah, D., Shin, J., Walrand, J.C.: Distributed random access algorithm: scheduling and congestion control. CoRR (2009). arXiv:0907.1266
Georgiadis, L., Neely, M.J., Tassiulas, L.: Resource allocation and cross-layer control in wireless networks. Found. Trends Netw. 1, 1–144 (2006)
Akyol, U., Andrews, M., Gupta, P., Hobby, J.D., Saniee, I., Stolyar, A.L.: Joint scheduling and congestion control in mobile ad hoc networks. In: Proc. IEEE Infocom, pp. 619–627 (2008)
Ryu, J., Bhargava, V., Paine, N., Shakkottai, S.: Design, implementation and evaluation of back-pressure routing/rate control for intermittently connected networks. In: ACM Int. Conf. on Mobile Computing and Networking (MobiCom) (2011)
Moeller, S., Sridharan, A., Krishnamachari, B., Gnawali, O.: Routing without routes: the backpressure collection protocol. In: Internat. Workshop on Inform. Processing in Sensor Networks (IPSN), pp. 279–290 (2010)
Zhao, H., Xia, C.H., Liu, Z., Towsley, D.: A unified modeling framework for distributed resource allocation of general fork and join processing networks. In: Proc. Ann. ACM SIGMETRICS Conf. (2010)
Jiang, L., Walrand, J.C.: Stable and utility-maximizing scheduling for stochastic processing networks. In: Proc. Allerton Conf. Communication, Control, and Computing (2009)
Massoulié, L., Twigg, A., Gkantsidis, C., Rodriguez, P.: Randomized decentralized broadcasting algorithms. In: Proc. IEEE Infocom, pp. 1073–1081 (2007)
Kowshik, H., Kumar, P.R.: Zero-error function computation in sensor networks. In: Proc. Conf. on Decision and Control, pp. 3787–3792 (2009)
Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a Tiny AGgregation service for ad hoc sensor networks. In: SIGOPS Oper. Syst. Rev, vol. 36, pp. 131–146 (2002)
Edmonds, J.: Edge-Disjoint Branchings. Combinatorial Algorithms (1972)
Acknowledgements
This work was supported in part by AFOSR under Grant FA9550-09-1-0317, NSF Grants CNS-0519535/0519401 (collaborative grant) and CNS-0964391.
Author information
Authors and Affiliations
Corresponding author
Additional information
A summary of the results in this manuscript appeared in the Proceedings of the 2011 IEEE Symposium on Information Theory (ISIT).
Appendix: Scheduling with random packet forwarding: detailed proofs
Appendix: Scheduling with random packet forwarding: detailed proofs
We now present the complete proof for the throughput-optimality of Algorithm 1 in directed acyclic graphs. Since the proof closely follows the proof of Massoulié et al.[28], we do not go into complete details, but try mainly to highlight the modifications we make in order to perform aggregation rather than broadcast.
First we need a lemma that ensures that under the useful packet transmission rule, each round of packets follows a spanning tree. Recall that the footprint of a round of packets is defined as the set of nodes in which the packets of that round is present. Further, recall that a set S is said to be a valid footprint-set if each node in S has a path to a in the subgraph induced by S; the collection of such sets is denoted by \(\mathcal{S}\). We assume throughout that \(\mathcal{N}\in\mathcal{S}\), for otherwise the min-mincut is 0. Note that since we operate in continuous time, only one packet transmission occurs at a given time with probability 1; further, we require that the local state information is available at the time of making routing decision. Now we have the following lemma:
Lemma 3
For a round of packets with footprint \(S\in\mathcal{S}\), the transmission of a useful packet results in a new footprint S′ which is also a valid footprint-set.
Proof
Since the underlying graph is directed acyclic, we re-label the nodes as {0,1,2,…,N−1} according to their topological ordering, where node 0 is the aggregator a, and all edges are from a higher numbered node to a lower numbered node. Further, given a round of packets on a valid footprint-set S, we have that each node k∈S has at least one route to a using only nodes in S; for short, we refer to such a route as a path from k to a in S.
Since we are operating in continuous time, with probability 1 only one packet transmission occurs at a given time. Now suppose a useful packet is transmitted on edge (j,i), where i<j, resulting in a new footprint-set S′=S∖{j}. For S′ to be a valid footprint, we need that even after the transmission, each node k∈S′ has a path to a in S′. To do this, we need to consider a partition of the nodes in S′ into 3 classes:
-
Node k∈S′ such that k<j in the topological order: due to the topological ordering property, a path from k to a in S is clearly unaffected by the packet transmission from j to i.
-
Node k∈S′,k>j such that there exists a path from k to a in S which does not include j: such a path is also unaffected by the packet transmission from j to i and hence is still present in S′.
-
Node k∈S′, k>j such that all paths from k to a in S pass through j: we show by contradiction that this case is impossible under the rules of useful packet transmission. For any path from k to a in S, let k′≤k be the node immediately before j (i.e., the path is k→⋯→k′→j→⋯→a). Then k′ has no path to a in S that does not pass through j, for otherwise we have a path from k to k′, and then to a, which does not pass through j. This means that k′ becomes isolated upon transmission of packet from j to i, which violates the non-isolation condition of useful packet forwarding.
Thus we have that S′ is a valid footprint-set. □
The main idea behind the proof in [28] was to define the ‘footprint-counter’ variables to represent the state of the system, and considering an appropriate function of these that allowed translating the local decisions of the nodes in terms of global graph parameters. In order to modify the proof for broadcast, we defined a similar collection of counter variables in Sect. 4, and now define their associated dynamics as follows.
-
Arrival of new round: \(X_{\mathcal{N}}\rightarrow X_{\mathcal {N}}+1\) (this corresponds to adding a packet to the queue with footprint-set \(\mathcal{N}\), as a packet of the new round is simultaneously generated at all the nodes).
-
Completion of packet transfer: This is only for active packets, i.e., those currently under transmission. For active packet \(r\in \mathcal{A}\) with corresponding (FP r ,E r ) and (u,v)∈E r , we have:
(The first equation corresponds to removing the edge over which packet transmission was completed, and also updating the footprint of the packet to include the new node. The second updates the list of idle packets in case there is no other instance of this packet being transmitted.)
-
Initiation of a new transfer at an idle link. The new packet is selected uniformly at random among the set of useful packets at the node. If \((u,v)\notin E_{r}\ \forall r\in\mathcal{A}\), then a new packet transfer is formally described as follows:
-
Select a useful packet of an idle round with footprint-set \(S\in \mathcal{S}, v\in S\), u∉S, with probability
$$ p_{S}=\frac{X_{S+u}}{X_{+u-v}+X^a_{+u-v}}. $$Select a useful packet of an active round \(r\in\mathcal{A}\) with \((FP_{r},E_{r})\in\mathcal{A}\) with probability
$$ p_r=\frac{1}{X_{+u-v}+X^a_{+u-v}}. $$ -
If idle packet with footprint S is selected, then \(X_{S}\rightarrow X_{S}-1, \mathcal{A}\rightarrow\mathcal{A}\cup\{r\}\), with (FP r ,E r )=(S,(u,v)). If packet of active round r is selected, then E r →E r ∪{(u,v)}.
-
We note here that the node itself does not need to know these global counters to perform packet selection; rather, this emerges from the use of the random useful packet forwarding rule. The idea of relating the local packet selection rule to the global counters is crucial in proving the optimality of the algorithm. The local rules for checking whether a packet is useful or not corresponds to selecting packets whose global footprint obeys certain properties; picking a useful packet uniformly at random therefore corresponds to picking a packet from such a useful global footprint with a probability proportional to the corresponding counter variable.
Observe that in order to determine the flow into a footprint-set S, we need to consider the collection of sets which include S and have one extra node. We now define the fluid limits of the system. This is similar in spirit to the fluid limit of the system in [28], so we try to use similar notation. The existence of the limit also follows immediately from their convergence results, so we omit it due to lack of space and refer interested readers to [28] for technical details.
The fluid limits of the system
The fluid trajectories \(t\rightarrow x_{S}(t), S\in\mathcal{S}\) corresponding to the system are defined as follows:
-
\(\forall (u,v)\in\mathcal{L},\ \forall S\) s.t. v∈S, u∉S, ∃t→ϕ S+u,(u,v)(t) s.t.
-
Work Conservation: At almost every t, ϕ S,(u,v)(t) is differentiable and if x +u−v (t)>0 (where x +u−v (t) is the fluid trajectory associated with X +u−v ), then we have
-
ϕ S,(u,v)(t) are non-decreasing, Lipschitz continuous, with Lipschitz constant c uv , and \(\sum_{S\in\mathcal {S}:v\in S, u\notin S}\phi_{S+u,(u,v)}(t)\) is c uv -Lipschitz.
For any \(y\in\mathbb{R}^{|\mathcal{S}|}_{+}, S(y)\triangleq\) set of all fluid trajectories with initial condition \(\in\nobreak C([0,\infty),\mathbb {R}_{+}^{|\mathcal{S}|})\), and further, we define \(\{X_{S}^{N}(t)\}_{S\in \mathcal{S}}\) as the state of the MC with initial conditions (X N(0),A N(0)), \(Y_{S}^{N}(t)=\frac{X^{N}_{S}(z_{N}t)}{z_{N}}\). Now, as in [28], for a sequence of initial conditions (X N(0),A N(0)),N>0 s.t. for a sequence of positive numbers (z N ) N>0,lim N→∞ z N =∞ and the limit
exists in \(\mathbb{R}^{|\mathcal{S}|}_{+}\), we have ∀T>0,ϵ>0:
The fluid Lyapunov function
Next, we define the candidate Lyapunov function that we use to analyze the stability of the system. In [28] the function was defined in terms of queues (or counters) that counted all the packets whose footprint was contained inside a set S. The advantage of these queues for studying broadcast was that their rate of increase was controlled by external arrivals to the system, while they were drained due to transfers across the cut defined by the set S.
For the purpose of studying aggregation, we need to identify an equivalent set of queues to reflect the unique dynamics of the system. In particular, we consider for each set S a queue of all rounds whose footprints are not entirely contained within S. These queues (counters) exhibit similar properties to the ones considered for broadcast in that every incoming round is counted by all these queues (as every node in the network generates a packet), while the drain of these queues is controlled by flow across the cut defined by the set S. Formally, we have the following theorem:
Theorem 5
Let \(\{x_{S}\}_{S\in\mathcal{S}}\) denote the fluid trajectories. \(\forall S\in\mathcal{S}\), define:
Then (given λ,c uv ) ∃β 1,β 2,…,β K−1>0,ϵ>0 such that the Lyapunov function
verifies
As in [28], before proving this theorem we first we need a combinatorial lemma. This lemma and its proof parallels a corresponding lemma in [28], with modifications to deal with aggregation and the x ⊈S counter variables we have defined above.
Lemma 4
Let α>0 be fixed (but arbitrary). We define:
Then \(\forall \{x_{S}\}_{S\in\mathcal{S}}\in\mathbb{R}_{+}^{|\mathcal {S}|}\), the following conditions hold:
-
1.
\(\forall S\in\mathcal{S}\), v∈S, u∉S, we have
$$ x_{+u-v}<(1+\alpha)^{-1}x_{\nsubseteq S} \quad \Rightarrow \quad \beta_{|S|+1}x_{\nsubseteq S+u}>\beta_{|S|}x_{\nsubseteq S}. $$ -
2.
\(\forall S\in\mathcal{S}\) such that ∀v∈S, u∉S, x +u−v ≥(1+α)−1 x ⊈S , if ∃v∈S, u∉S and some S′⊈S,v∈S′,u∉S′ such that x S′+u >αx +u−v , then
$$ \beta_{|S\cup S'|}x_{\nsubseteq S\cup S'}>\beta_{|S|}x_{\nsubseteq S}. $$
Note that Lemma 4 does not depend on the algorithm, or the fluid model in any way. It is a pure combinatorial property of the way that the quantities are defined. In other words, any function mapping the sets \(S\in\mathcal{S}\) to ℝ+ obeys the lemma for any α>0. Later we use the ability to control α to obtain uniform bounds on the Lyapunov drift.
Proof
For the first condition, consider \(S\in\mathcal{S}\), v∈S, u∉S such that
Then we have
and thus
However, from the definition of the β i , we have \(\beta _{i}\frac{1+\alpha}{\alpha}=\beta_{i+1}\) for all i=1,2,…,N−1. Hence we have
For the second condition, consider \(S\in\mathcal{S}\) such that ∀v∈S, u∉S, x +u−v ≥(1+α)−1 x ⊈S . Further, consider set S′ such that S′⊈S, v∈S′, u∉S′ and satisfying
Then we have
Thus for our condition, we need
and noting the fact that β i are increasing with i, it is sufficient to ensure
This in fact holds with equality because of our choice of β i . Thus, given any α>0, we can construct β i such that the two conditions hold. □
Now, we use Lemma 4 to prove Theorem 5. The steps of this proof closely follow the corresponding proof in [28].
Proof of Theorem 5
Given α>0, we define β i as in Lemma 4. Then, or any \(y\in\mathbb{R}_{+}^{|\mathcal{S}|}\), if S ∗ is a set which belongs to arg-max of \(\max_{S\in\mathcal{S}}\beta _{|S|}x_{\nsubseteq S}\), then \(x_{S^{*}_{+}}>0\) (unless all the fluid sample paths are identically 0).
Next, we use the optimality of S ∗ to obtain some relations between \(x_{S^{*}_{+}}\) and the weight across its cut-edges. ∀v∈S ∗, u∉S ∗ such that \((u,v)\in\mathcal{L}\), we have from the contrapositive of the first condition of Lemma 4 (as S ∗ is in the arg-max) that
Similarly from condition 2, ∀v∈S ∗, u∉S ∗, S′⊈S ∗ such that v∈S′, u∉S′, we have
Now, we have
If we choose α and ϵ as follows:
then we get that, for all \(S^{*}\in\arg\max_{S\in\mathcal{S}}\beta _{|S|}x_{\nsubseteq S}\),
To argue that this implies negative drift of the Lyapunov function, i.e. \(L(x(t))=\max_{S\in\mathcal{S}}\beta_{|S|}x_{\nsubseteq S}\leq\max (0,L(x(0))-\epsilon t)\), we observe that by definition β |S|≥1 \(\forall S\in\mathcal{S}\). Finally, using the Lipschitz continuity of the trajectories, it is sufficient to show this property holds for the sets \(S^{*}\in\arg\max_{S\in\mathcal{S}}\beta_{|S|}x_{\nsubseteq S}\). □
Finally we can prove Theorem 3 using the stability of the fluid limit process along with standard techniques from literature; for technical details, see [28].
Rights and permissions
About this article
Cite this article
Banerjee, S., Gupta, P. & Shakkottai, S. Towards a queueing-based framework for in-network function computation. Queueing Syst 72, 219–250 (2012). https://doi.org/10.1007/s11134-012-9296-8
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11134-012-9296-8