2014
DOI: 10.1287/13-ssy104
|View full text |Cite
|
Sign up to set email alerts
|

Queue-based Random-access Algorithms: Fluid Limits and Stability Issues

Abstract: We use fluid limits to explore the (in)stability properties of wireless networks with queue-based random-access algorithms. Queuebased random-access schemes are simple and inherently distributed in nature, yet provide the capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. Unfortunately, the type of activation rules for which throughput optimality has been established, may result in excessive queue lengths and delays. The use of more aggress… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(32 citation statements)
references
References 34 publications
0
32
0
Order By: Relevance
“…Additionally, there are protocols that often require some explicit coordination (e.g., slotting [14,43,46,59], or explicitly require exchange of parameters [42], which are not suitable for emerging ultra-low-power nodes. From the theoretical point of view, our approach is inspired by the prior work on network utility maximization (e.g., [13,30,35,36]), and queue-based CSMA literature (e.g., [18,19,25,33,40,58]). However, the problem considered in this paper is not a simple extension of the prior work for two reasons.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, there are protocols that often require some explicit coordination (e.g., slotting [14,43,46,59], or explicitly require exchange of parameters [42], which are not suitable for emerging ultra-low-power nodes. From the theoretical point of view, our approach is inspired by the prior work on network utility maximization (e.g., [13,30,35,36]), and queue-based CSMA literature (e.g., [18,19,25,33,40,58]). However, the problem considered in this paper is not a simple extension of the prior work for two reasons.…”
Section: Related Workmentioning
confidence: 99%
“…The complete proof can be found in [12]. The proof is based on a Markov Chain Monte Carlo (MCMC) approach [18,25,40] from statistical physics.…”
Section: Proof Outline Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…with (κ 1 ∨ κ 2 ) + κ 3 + κ 6 = 1, and 0 < α < (κ 3 ∧ κ 6 ). Then the main result of Ghaderi et al in [90] implies that there exists a constant * (κ, α) < 1, such that for all ∈ ( * (κ, α), 1] the Markov process is transient under the given parameter conditions.…”
Section: Transitionmentioning
confidence: 99%
“…So far we have presented classical examples that facilitated the assessment of the algorithm's performance. In our final example we address a contemporary area of research initiated by [90], exploring the stability properties of a wireless network with a queue-based random-access algorithm. We focus on a network consisting of nodes {1, 2, .…”
Section: A Broken Diamond Random Access Networkmentioning
confidence: 99%