TY - GEN
T1 - Consort
T2 - IEEE INFOCOM 2011
AU - Fang, Xi
AU - Yang, Dejun
AU - Xue, Guoliang
PY - 2011
Y1 - 2011
N2 - Opportunistic routing is proposed to improve the performance of wireless networks by exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper, we study the problems of how to choose opportunistic route for each user to optimize the total utility or profit of multiple simultaneous users in a wireless mesh network (WMN) subject to node constraints. We formulate these two problems as two convex programming systems. By combining primal-dual and subgradient methods, we present a distributed iterative algorithm Consort (node-Constrained Opportunistic Routing). In each iteration, Consort updates Lagrange multipliers in a distributed manner according to the user and node behaviors obtained in the previous iteration, and then each user and each node individually adjusts its own behavior based on the updated Lagrange multipliers. We prove the convergence of this iterative algorithm, and provide bounds on the amount of feasibility violation and the gap between our solution and the optimal solution in each iteration.
AB - Opportunistic routing is proposed to improve the performance of wireless networks by exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper, we study the problems of how to choose opportunistic route for each user to optimize the total utility or profit of multiple simultaneous users in a wireless mesh network (WMN) subject to node constraints. We formulate these two problems as two convex programming systems. By combining primal-dual and subgradient methods, we present a distributed iterative algorithm Consort (node-Constrained Opportunistic Routing). In each iteration, Consort updates Lagrange multipliers in a distributed manner according to the user and node behaviors obtained in the previous iteration, and then each user and each node individually adjusts its own behavior based on the updated Lagrange multipliers. We prove the convergence of this iterative algorithm, and provide bounds on the amount of feasibility violation and the gap between our solution and the optimal solution in each iteration.
UR - http://www.scopus.com/inward/record.url?scp=79960879624&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79960879624&partnerID=8YFLogxK
U2 - 10.1109/INFCOM.2011.5934993
DO - 10.1109/INFCOM.2011.5934993
M3 - Conference contribution
AN - SCOPUS:79960879624
SN - 9781424499212
T3 - Proceedings - IEEE INFOCOM
SP - 1907
EP - 1915
BT - 2011 Proceedings IEEE INFOCOM
Y2 - 10 April 2011 through 15 April 2011
ER -