Transmission scheduling in wireless networks with SINR constraints

Evelina Klerides*, Themistoklis Charalambous

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

Abstract

Despite all the work being done so far in scheduling for wireless networks, the transmission scheduling problem with specific constraints is not yet fully understood and explored. In this work, we find the minimum number of time-slots (or channels) required in any given network and the corresponding transmitting powers, such that all communication requests are being processed correctly, while fulfilling specific constraints that comply with the Quality of Service (QoS) requirements for successful transmissions. More specifically, in this paper, we formulate the optimization problem as a Mixed Integer Program (MIP) and solve the mathematical formulation by a Branchand-Bound algorithm. Our computational study shows that our methodology is capable of solving exactly networks of varying size but can also provide a near optimal heuristic solution for the hardest instances. The results can be used as bounds for the study of distributed algorithms that aim for the optimal scheduling and power assignment without information about the whole network. Numerical examples are provided to illustrate the validity of our proposed methodology.

Original languageEnglish
Title of host publicationProceedings of the 5th International Conference on Networking and Services, ICNS 2009
Pages155-160
Number of pages6
DOIs
Publication statusPublished - 2009
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Networking and Services - Valencia, Spain
Duration: 20 Apr 200925 Apr 2009
Conference number: 5

Conference

ConferenceInternational Conference on Networking and Services
Abbreviated titleICNS
CountrySpain
CityValencia
Period20/04/200925/04/2009

Fingerprint Dive into the research topics of 'Transmission scheduling in wireless networks with SINR constraints'. Together they form a unique fingerprint.

Cite this