Implementing utility-optimal CSMA

Jinsung Lee, Junhee Lee, Yung Yi, Song Chong, Alexandre Proutière, Mung Chiang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Scopus citations

Abstract

Hundreds of papers over the last two decades have studied the theory of distributed scheduling in wireless networks, including a number of them on stability or utility maximizing random access. Several publications in 2008 studied an adaptive CSMA that in theory can approach utility optimality without any message passing under a number of assumptions. This paper reports the results from the first deployment of such random access algorithms through an implementation over conventional 802.11 hardware, an on-going effort that started in summer 2009. It shows both a confirmation that Utility Optimal CSMA may work well in practice even with an implementation over legacy equipment, and a wide array of gaps between theory and practice in the field of wireless scheduling. This paper therefore also brainstorms the discovery of and bridging over these gaps, and the implementation-inspired questions on modeling and analysis of scheduling algorithms.

Original languageEnglish (US)
Title of host publication2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Pages102-111
Number of pages10
DOIs
StatePublished - 2009
Event2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009 - Monticello, IL, United States
Duration: Sep 30 2009Oct 2 2009

Publication series

Name2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009

Other

Other2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Country/TerritoryUnited States
CityMonticello, IL
Period9/30/0910/2/09

All Science Journal Classification (ASJC) codes

  • Communication
  • Control and Systems Engineering
  • Computer Science(all)

Keywords

  • 802.11
  • CSMA
  • Distributed algorithm
  • Optimization
  • Random access
  • Scheduling
  • Systems
  • Wireless networks

Fingerprint

Dive into the research topics of 'Implementing utility-optimal CSMA'. Together they form a unique fingerprint.

Cite this