Abstract

We show an impact of using interference cancelation mechanisms for signals that have been overheard in the past on performance of fair wireless mesh networks. In our research we show that even in those very restricted conditions and max-min cost function, the idea of interference cancelation can significantly increase the capacity of such networks. In order to approximate possible advantages of using interference cancelation in the considered conditions, we propose a novel MIP model that allows for calculating perfect scheduling and maximal throughput in a network. We compare the results with cases when the interference cancelation mechanisms are disabled. Our results show that using interference cancelation mechanisms for signals that have been overheard in the past increases a network throughput by 40% on average in approximately 20% of test cases.

1. Introduction

Mesh networking in wireless communications is a way to increase network capacity, for example, with respect to single-hop cellular networks, through using short-distance radio links of relatively high capacity and establishing point-to-point connections on multi-hop routes. In this way packets from an origin are relayed by intermediate nodes on their way to a destination. Today, wireless mesh networks (WMN) are mainly used for providing affordable Internet access to communities of users in metropolitan areas (see [1, 2]). A typical wireless access network (WAN) is based on the IEEE 802.11-family Wi-Fi standards and consists of a set of fixed mesh nodes—routers and Internet gateways—interconnected by radio links. The mesh routers serve mesh clients (which are either fixed or mobile) and at the same time perform the packet relay function. WMN is a cost-efficient off-the-shelf networking that provides bandwidth in the range of up to hundreds Mbps. For popular surveys on WMN, see [3, 4].

Wireless PHY layer techniques are very mature nowadays and can achieve close to Shannon limit transmission capacities in point-to-point scenarios. Therefore, novel research directions that can result in the capacity increase of wireless networks are of interest now. One of such directions is to increase the spatial reuse by increasing a number of simultaneous transmissions that use the same medium. The direction proved to be very promising when IEEE 802.11n enhancements for higher throughput amendment [5] started to be widely used and a throughput of a single Wi-Fi transmission increased from 54 Mbps to 600 Mbps, mostly due to introduction of multiple-input multiple-output (MIMO) techniques.

In MIMO a source node transmits a number of independent data streams using a number of different antennas. In a sink node the streams are received also using a number of antennas. Although the streams are transmitted simultaneously and they strongly interfere with each other, they still can be successfully decoded due to phase shifts between them while being received by different antennas of the sink node.

The idea of using receiving techniques that involve recognizing and removing interferences from a signal is now shifting from a point-to-point scenario (like in MIMO) to more general scenarios like concurrent transmissions of many independent nodes. The technique is called interference cancelation and has been successfully implemented, for instance, in cellular networks [6]. A recent survey on successful interference cancelation implementations can be found in [7]. Currently, possibilities of employing the techniques in wireless mesh networks along with other ideas like zero-canceling [8] or interference alignment [9, 10] are being investigated.

One of assumptions of majority of work on interference canceling in wireless mesh networks is that canceling mechanisms are perfect. Therefore, if an interfering signal can be decoded, then it can be completely removed. The assumption works well when acceptable signal-to-interference-plus-noise (SINR) ratios of used modulations and codings schemes (MCSs) are rather low. When we assume that utilized MCSs require much higher SINR thresholds, then the quality of the interference canceling mechanisms becomes a factor and the previously justified assumption of perfect cancelation should be reconsidered.

In this paper we consider a case when SINR thresholds are relatively high and the usage of interference cancelation mechanisms is restricted only to cases when an interfering signal is canceled not because it can be decoded, but because it had been overheard in the past. In our research we show that even in this very restricted conditions the idea of interference cancelation can significantly increase the capacity of a wireless mesh network. In order to approximate possible advantages of using interference cancelation in the restricted conditions, we propose a novel mixed integer programming (MIP) model that describes the problem and allows for finding a perfect scheduling, thus calculating maximal throughput in a network. We compare the results with results obtained using an MIP model of [11] that describes a case when the interference cancelation mechanisms are not used. Our results show that using interference cancelation mechanisms in the restricted conditions increases a network throughput by 40% on average in approximately 20% of test cases.

The paper in organized as follows. In Section 2 we briefly explain technical issues of interference cancelation in overall and special features of the approach used in this research in detail. Next, in Section 3 we present a novel MIP model that allows for optimization of scheduling in wireless mesh networks that use the interference cancelation mechanisms for overheard transmissions. In Section 4, numerical results are presented. They are followed by conclusions given in Section 5.

2. Interference Canceling

The core components of a WMN that form its infrastructure/backbone are mesh points (MPs). They are responsible for relaying traffic. They can relay traffic of either other MPs or legacy nodes (STAs). Obviously they can also send their own traffic. Legacy STAs are connected to MAPs (specialized MPs that also act as access points for STAs) and follow the principle of a generic wireless local area network node. Other specialized MPs are responsible for connecting a WMN to an external network (usually the Internet). They are called mesh point portals or gateways and are abbreviated by MPP.

In radio networks two stations and can communicate if the power of the signal received from station at station in comparison to the noise at station is greater than an acceptable signal-to-noise (SNR) threshold for the applied modulation and coding scheme (MCS). In WMN networks the radio resources are shared between all MPs. Thus, typically all MPs cannot transmit simultaneously but, of course, simultaneous transmissions by subsets of stations are still possible. In such a case, however, not only the noise can disrupt transmission but also the interferences induced by other MPs. Therefore, in the context of WMN we use the notion of signal-to-interference-plus-noise ratio (SINR) instead of SNR. SINR is understood as a proportion of a received power to a sum of the noise and the received interferences.

As there is little one can do with the noise, novel ways interferences that can be combated are of great interest. Two of such techniques, that is, zero-forcing [8] and interference alignment [9], are successfully used in point-to-point transmissions in MIMO technology. In WMN a promising interference combating strategy consists of various interference cancelation (IC) techniques. The notion behind IC is that if a node receives a signal consisting of an interfering signal and a signal of interest (assume that cannot be decoded due to the interferences) and data encoded in are known, then the interfering signal can be reconstructed in the considered node using the known data, subtracted from the received signal, and finally can be decoded.

The strategy can be used twofold. First, the signal can be itself strong enough that it can be decoded in the receiving node regardless of interferences created by the signal . Then, having data encoded in , it is possible to reconstruct and subtract it from the received signal. This approach was used in practice, for instance, in [12] where authors successfully implemented IC in a ZigBee network. However, the approach has one major disadvantage: it proved to work efficiently only with relatively low SINR thresholds. The reason is limited efficiency of IC detectors. In ideal conditions it is possible to reduce an interfering signal by up to 30 dB [12]. In practice, due to propagation and multipath issues, the efficiency rate is much smaller. Therefore, assuming that an SINR threshold is relatively high, if it is possible to decode an interfering signal , then the signal is too strong to be canceled to such an extent that a signal of interest can also be decoded. The way such a version of the problem can be approached in terms of optimization can be found in [13].

In our research we concentrate on the second way of using IC (see, for instance, [14, 15]). In this approach a main assumption is that data carried by an interfering signal is known from previous transmissions. Consider an example presented in Figure 1, where wants to send a packet to and wants to send a packet to . Both packets are relied, the former by , the latter by . The arrows represent that possible links packets can be sent on; that is, if there is an arrow between a pair of MPs, then packets can be successfully sent between them. What is more, the arrows also represent possible interferences; for example, if is transmitting to , then cannot transmit to as the first transmission will jam the second. Therefore, in order to successfully meet both traffic demands, four time slots have to be used, because, due to possible interferences, there are no pairs of needed transmissions that can be conducted simultaneously. However, when transmissions are properly ordered and IC mechanisms are utilized, the traffic demands can be met in just three time slots. First, transmits to , but the packet is overheard, that is, successfully received and decoded, by . Then, transmits to and simultaneously transmits to . During this step receives two signals (from and from ) that interfere with each other. However, knows data encoded in the signal from ; thus it can reconstruct it and subtract it from the received signal (perform interference cancelation). Finally, it can decode the packet sent from . In the last step, sends the decoded packet to , thus satisfying the traffic demands. This simple example (other more sophisticated examples can be found in [16]) illustrates IC mechanisms that are considered in our research.

A vigilant eye would notice that this IC mechanism can be only used when a packet relayed by a node is not subject to any modifications in this node. Obviously that is usually not the case, as the relay node changes both a header and a CRC code that ends the packet. However, when appropriately approached, even this obstacle can be combated. The way of doing this is to let the to be canceled packet by transmitted slightly earlier. If the header of the packet is received by a node that is going to cancel it without any interferences, then the rest of this packet including CRC can be treated with IC mechanisms without any further problems and will not affect other transmissions that are supposed to happen right after the header of the canceled packet is received.

A major novelty of this paper is a tractable optimization model that encompasses the described IC mechanisms. In our research we assume a common interference model where two transmissions interfere only if a sender in the first transmission can successfully transmit to a receiver in the second transmission, or a sender in the second transmission can successfully transmit to a receiver in the first transmission. More sophisticated interference model, where a signal power is taken into account and all concurrent transmission interacts with each other, can be found, for instance, in [17].

We consider an architecture presented in Figure 2, where a set of MPs, a set of MPPs, and a set of links, routing, and possible interferences are given, and our task is to schedule transmissions in an optimal way. As volumes of demands in WMN are hard to predict, we decided to use the max-min fairness (MMF) paradigm (see, for instance, [18]) and maximize the throughput of the worst served MP.

We assume that the considered WMN is synchronized; a number of time slots are infinitely repeated. Our task is to assign point-to-point transmissions to those time slots in such a way that the objective is maximized. In order to better understand the notion of time slots, consider the example of Figure 1 with demands from to and from to and a bit rate of each link equal to 1 Mbps. If there are four available time slots and the IC mechanisms are disallowed, then both and will be the worst served MPs with 0.25 Mbps for each of them. What is more, when the IC mechanisms are used, the situation will not change. Although only three time slots are needed to serve each relevant MP with 0.25 Mbps, the fourth time slot cannot be effectively used; thus it is wasted in every cycle. On the other hand, when there are six available time slots and the IC mechanisms are disallowed, then only 0.17 Mbps can be provided to the worst served MP, while the other MP can be provided with 0.33 Mbps. However, when the IC mechanisms are used, both MPs can be served with 0.33 Mbps.

There is substantial literature on the optimization of scheduling and MCS selection in wireless mesh networks (see, for instance, [11, 17] and references therein). However, the topic of the scheduling and MCS selection optimization under IC constraints has not been yet exhaustively researched. In [19] the problem is raised, but the authors do not take routing into account. On the other hand, in [20] (extended later in [21, 22]), although routing is taken into account, the methodology of solving the problem is different and does not guaranty the optimality of solutions. What is more, in both cases perfect IC is assumed and overheard transmissions are not taken into account as far as IC is concerned.

3. Optimization Model

3.1. Notation

In order to formally present the problem, we introduce the following notation.

Indices: Mesh link: Time slot: MCS: Mesh nodes: Demand: Mesh link from mesh node to mesh node : Mesh node that is a source of mesh link : Mesh node that is a sink of mesh link .

Sets: Set of mesh nodes: Set of mesh links: Set of mesh links leaving mesh node : Set of mesh links entering mesh node : Set of demands: Set of mesh links that form a path for demand : Set of MCSs: Set of time slots.

Constants: Bit rate of MCS : 1 if mesh node can jam a transmission at mesh link that uses MCS ; 0 otherwise; notice that when : 1 if mesh link can be successfully used with MCS ; 0 otherwise.

Variables: 1 if mesh link is transmitting in time slot using MCS ; 0 otherwise: 1 if mesh node is transmitting in time slot ; 0 otherwise: 1 if mesh link is transmitting in time slot using MCS and the data is decoded in mesh node ; 0 otherwise; notice that the data can be decoded not only by : 1 if mesh node is transmitting in time slot using MCS but mesh node is canceling the interference; 0 otherwise: Average transmission bit rate sent to mesh node overheard by mesh node : Average transmission bit rate at mesh link : Average transmission bit rate for demand : Average transmission bit rate for the worst served demand.

In order to use the above notation, the defined sets and constants have to be relatively stable and possible to obtain. Therefore, the following requirements have to be met.(i) is known and does not change. When failures are not considered, the requirement is met.(ii) is known and does not change. When propagating conditions are relatively stable and nodes do not move, the requirement is met.(iii) is known and does not change. See above.(iv) is known and does not change. When a network consists of a number of MPPs and all other nodes are connected to them using static paths, the requirement is met.(v) serving a demand (for all ) does not change. When a routing is static, the requirement is met.(vi) is known and does not change. The requirement is always met.(vii) is known and does not change. When a network is synchronized, the requirement is met. We assume that a number of possible time slots are given.(viii) are known and do not change. The requirement is always met.(ix) are known and do not change. The requirement needs a detailed discussion; see below.(x) are known and do not change. In our research we compute constants and using a mechanism described below. When properly used, the mechanisms guarantee that the requirements concerning and are met.

An approach used to compute constants and is similar to the one presented in [11]. In order to explain it in details the following notation is necessary.: Noise level: SINR threshold for MCS : Power received by mesh node when mesh node is transmitting.

The notation above does not appear in the final formulation of the problem and is solely used in order to define constants and . The former constant is defined by (1), while the latter by (2). The equations guarantee that a given MCS can be used only if power of a signal of interest received at a node is greater than the noise and considered interferences. It is worth to mention that constants are in linear scale here and not logarithmic:

If we assume that mesh nodes do not move and propagating conditions are relatively stable, then and can be treated as constants in both (1) and (2). As is also a constant, therefore and can also be treated as constants.

Finally, we assume that a kind of OSPF routing is used. The assumption is irrelevant from the point of view of the notation. However, in our model we require that a path used by a packet before reaching a given node is irrelevant. The requirement is met when there is exactly one path to each node; thus it can be met when a kind of OSPF routing is used in a network.

To summarize, in order to use the model presented in this paper, the following conditions have to be assumed.(i)Failures are not considered.(ii)Mesh nodes do not move.(iii)Propagating conditions are relatively stable.(iv)Network consists of a number of MPPs and all other nodes are connected to them using static paths.(v)Routing is static.(vi)Network is synchronized.(vii)Kind of OSPF routing is used.

3.2. MIP Model

When the conditions presented above are assumed, we can formally state the problem in the form of formulations (3a)–(3m) below. It is a compact mixed integer-linear programming formulation that has proved to be tractable for network consisting of tens of nodes:

maximize

subject to

In our research we use the max-min cost function [23]; thus the objective of (3a)–(3m) is to maximize the minimum flow to the worst served MP. Constraint (3a) assures that a node during one time slot can transmit only on one link using only one MCS. Constraint (3b) prevents nodes from decoding data that are not transmitted. In other words, only packets that have been sent can be decoded. The purpose of (3c) is to calculate the average transmission bit rate sent to ( in the next constraint) and decoded by . The computed value is an upper bound for the average transmission bit rate sent from and canceled in . The upper bound is enforced by (3d). Obviously the interference cancelation can take place only if a transmission to be canceled takes place. This condition is enforced by (3e). The next constraint, that is, (3f), assures that a transmission can be successfully decoded only if it is not jammed by other transmissions. Notice that transmissions that have been earlier overheard and currently are canceled cannot jam concurrent transmissions. Constraint (3g) assures that only MCSs satisfying SNR thresholds are used, while (3h) calculates the average useful transmission bit rate at each link. Notice that canceled transmissions do not count towards the average useful transmission bit rate. Constraint (3i) disallows MPs to cancel self-interferences. It is worth noticing that some work on canceling self-interferences exists and a full-duplex has even been implemented in practice [24]. However, it required a special technique called antenna cancelation; thus in our research we assume that the self-interferences cancelation is impracticable and is not being used. Constraint (3j) divides available capacity of a network between different traffic demands, and (3k) assures that the division is fair; average throughput of the worst served demand is maximized. Finally, constraints (3l) and (3m) are responsible for binarity and nonnegativity of the variables.

3.3. Valid Inequalities

The presented MIP model is relatively complicated and solving it requires significant computation effort. In order to increase its applicability, we present three practical valid inequalities. They are not indispensable from the point of view of the correctness of the model. However, they tight a polytop of a relaxed problem, thus making branch-and-bound approach work more efficiently:

The first valid inequality (4a) guarantees that on each mesh link that is used by at least one demand there is a transmission scheduled during at least one time slot. What is more, during that time slot not only the transmission has to occur but also it cannot be subject to interference cancelation at the receiving end of the mesh link. The inequality limits the number of possibilities of dividing time slots into smaller parts while solving relaxed versions of the problem during the B&B process. Notice that this inequality is formally not a valid inequality, as it cuts feasible solutions of cost 0. However, from the practical point of view, those solutions are useless. Therefore, we decided to treat this inequality as valid.

The second valid inequality (4b) guarantees that a mesh node either transmits or receives data from aother mesh node. The inequality disallows a number of relaxed solutions when a mesh node receives and decodes a number of “half” transmissions and simultaneously “half” transmits itself; that is, and in constraint (3f).

The last valid inequality (4c) guarantees that if a mesh node performs interference cancelation during at least one time slot, then it had to overheard a transmission to be canceled during at least one other time slot. The inequality introduces tight connections between binary variables and . In model (3a)–(3m) the variables were related using variable and constraints (3c) and (3d).

4. Numerical Results

We tested numerically the optimization model presented in Section 3 using CPLEX 12.5 set up on Intel Core 2 Quad CPU Q6600 2.40 GHz with 4.00 GB RAM. We used 50 randomly generated network topologies for each test case from Table 2. All nodes of the networks were randomly located on a square. We followed [25] and assumed the path loss exponent of 4 while calculating power received at each station and establishing mesh links. Notice that the topology and the path loss exponent allow us to calculate both and . Each MP is routed to the nearest MPP using the shortest path with respect to weights of links. We set the weight of link to the inverse of . Each link uses an available (satisfying the SINR constraint) MCS from Table 1 with maximal . In order to minimize a number of infeasible instances, locations of nodes were scaled in such a way that the longest utilized link in a network was of a maximal length allowing for a successful transmission using the least demanding MCS.

Numerical results are presented in Table 3. The first column contains topology identifiers. They inform which test case from Table 2 is under consideration. The second column contains the number of time slots in a test case. The following six columns contain efficiency specific information. For each case we gathered mean running time of the MIP solver, a number of timeouts (the time limit was set to ten minutes), and a mean number of B&B nodes entered, for both a case with valid inequalities of Section 3.3 and a case without the valid inequalities. The last two columns justify usage of IC in WMN. The first of them contains a percentage of cases which can be improved by employing IC, while the second contains an average obtained gain for those cases. It is expressed in percents and understood as times 100%, where is for a test case that does not use IC and is for a test case taking advantage of IC.

The numerical results prove the expected complexity of the problem. Running times show a limited tractability of the presented MIP model. However, the limited tractability is accompanied by considerable gains in terms of network capacity. It is worth mentioning that the max-min cost function used in our research is one of the most restrictive and in many cases it is impossible to obtain better results due to one very inconveniently located mesh node. In those cases, although the max-min gain is equal to zero, using IC techniques still can increase throughput for better served mesh nodes.

As for the usage of the valid inequalities of Section 3.3, it almost always decreases a number of visited B&B nodes. However, it not always assures that a problem will be solved faster. In fact, as can be seen in Figure 3, it is usually profitable to use the valid inequalities for cases with a small number of time slots. However, when the number of time slots increases, then the valid inequalities lose their importance.

Running times presented in Figure 3 may create an impression that the model is useless for larger networks. Additionally taking into account the information about timeouts presented in Table 3, one may claim that with so many unsolved test cases the model is impractical. However, notice that a timeout does not mean that the MIP solver has not returned any solution for a test case. A timeout only means that the MIP solver was not able to prove an optimality of a returned solution, which still in many cases was better than a solution obtained when IC was not considered.

Finally, our results show an interesting impact of increasing the number of time slots on the problem. As expected, increasing a number of time slots complicates the problem making it more difficult to solve. This fact is clearly seen in Figure 3. However, an impact of increasing the number of time slots on efficiency of IC is not so straightforward. On one hand, as seen in Figure 4, the more the time slots are available, the bigger the chance that using IC can be profitable. On the other hand, as seen in Figure 5, the more the time slots are available, the smaller the gain IC can bring. Such a behavior is a result of an increased elasticity brought by an increased number of available time slots. The increased elasticity extends a feasibility region of our problem making it easier to find better solutions than those available in a case when IC is disallowed. On the other hand, with increased elasticity, all the changes in a solution result in much smaller impact on the global objective function, thus making possible gains smaller.

5. Conclusion

In the paper we show that the idea of interference cancelation can significantly increase the capacity of a wireless mesh network even when the max-min objective function is taken into account, and the interference cancelation can be applied only to signals that have been overheard in the past. In order to approximate possible advantages of using interference cancelation in the considered conditions, we presented a novel MIP model that allows for calculating perfect scheduling and maximal throughput in a network. We compare our results with results obtained for cases when the interference cancelation mechanisms are disabled. Our results show that using interference cancelation mechanisms for signals that have been overheard in the past increases a network throughput by 40% on average in approximately 20% of test cases.

The work presented in this paper can be extended in many different directions. One of possible extensions is to consider the full interference model instead of the used simplified interference model. Another interesting research direction is to present the problem using a noncompact formulation based on the idea of compatible sets (see [11, 17]) that allows for an indirect consideration of an infinite number of time slots. Notice that both of the suggested possible extensions cannot be directly incorporated into our MIP model and require deeper studies.

Conflict of Interests

The author declares that there is no conflict of interests regarding the publication of this paper.

Acknowledgment

The work presented in this paper has been funded by National Science Center (Poland) under Grant 2011/01/B/ST7/02967 “integer programming models for joint optimization of link capacity assignment, transmission scheduling, and routing in fair multicommodity flow networks.”