Peng-Jun Wan

Illinois Institute of Technology, Chicago, Illinois, United States

Are you Peng-Jun Wan?

Claim your profile

Publications (171)90.6 Total impact

  • Wireless Networks 01/2015; DOI:10.1007/s11276-015-0915-2 · 1.06 Impact Factor
  • ACM Transactions on Sensor Networks 11/2014; 11(1):1-20. DOI:10.1145/2629518 · 1.46 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Multiple-input multiple-output (MIMO) technology provides a means of boosting network capacity without requiring additional spectrum. It has received widespread attention over the past decade from both industry and academic researchers, now forming a key component of nearly all emerging wireless standards. Despite the huge promise and considerable attention, a rigorous algorithm-theoretic framework for maximizing network capacity in multihop wireless MIMO\ networks is missing in the state of the art. The existing algorithms and protocols for maximizing network capacity in multihop wireless MIMO networks are purely heuristic without any provable performance guarantees. In this paper we conduct a comprehensive algorithm study for maximizing network capacity in multihop wireless MIMO networks with receiver-side interference suppression, including the full characterization of NP-hardness and APX-hardness, the polynomial time approximation schemes, and the practical approximation algorithms with provable performance guarantees.
  • Peng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji
    [Show abstract] [Hide abstract]
    ABSTRACT: Maximum multiflow and maximum concurrent mul-tiflow in multi-channel multi-radio (MC-MR) wireless networks have been well-studied in the literature. They are NP-hard even in single-channel single-radio (SC-SR) wireless networks when all nodes have uniform (and fixed) interference radii and the positions of all nodes are available. While they admit a polynomial-time approximation scheme (PTAS) when the number of channels is bounded by a constant, such PTAS is quite infeasible practically. Other than the PTAS, all other known approximation algorithms, in both SC-SR wireless networks and MC-MR wireless networks, resorted to solve a polynomial-sized linear program (LP) exactly. The scalability of their running time is fundamentally limited by the general-purposed LP solvers. In this paper, we first introduce the concept of interference costs and prices of a path and explore their relations with the maximum (concurrent) multiflow. Then we develop purely combinatorial approximation algorithms which compute a sequence of least interference-cost routing paths along which the flows are routed. These algorithms are faster and simpler, and achieve nearly the same approximation bounds known in the literature.
    IEEE INFOCOM 2014 - IEEE Conference on Computer Communications; 04/2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: Finding a maximum-weighted independent set of links is a fundamental problem in wireless networking and has broad applications in various wireless link scheduling problems. Under protocol interference model, it is NP-hard even when all nodes have uniform (and fixed) interference radii and the positions of all nodes are available. On one hand, it admits a polynomial-time approximation scheme (PTAS). In other words, for any fixed ε > 0, it has a polynomial-time (depending on ε) (1 + ε)-approximation algorithm. However, such PTAS is of theoretical interest only and is quite infeasible practically. On the other hand, only with the uniform interference radii is a simple (greedy) constant-approximation algorithm known. For the arbitrary interference radii, fast constant-approximation algorithms are still missing. In this paper, we present a number of fast and simple approximation algorithms under the general protocol interference model. When applied to the plane geometric variants of the protocol interference model, these algorithms produce constant-approximate solutions efficiently.
    IEEE INFOCOM 2014 - IEEE Conference on Computer Communications; 04/2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: We are in an age where people are paying increasing attention to energy conservation around the world. The heating and air-conditioning systems of buildings introduce one of the largest chunks of energy expenses. In this article, we make a key observation that after a meeting or a class ends in a room, the indoor temperature will not immediately increase to the outdoor temperature. We call this phenomenon thermal inertia. Thus, if we arrange subsequent meetings in the same room rather than in a room that has not been used for some time, we can take advantage of such undissipated cool or heated air and conserve energy. Though many existing energy conservation solutions for buildings can intelligently turn off facilities when people are absent, we believe that understanding thermal inertia can lead system designs to go beyond on-and-off-based solutions to a wider realm. We propose a framework for exploring thermal inertia in room management. Our framework contains two components. (1) The energy-temperature correlation model captures the relation between indoor temperature change and energy consumption. (2) The energy-aware scheduling algorithms: given information for the relation between energy and temperature change, energy-aware scheduling algorithms arrange meetings not only based on common restrictions, such as meeting time and room capacity requirement, but also energy consumptions. We identify the interface between these components so further works towards same on direction can make efforts on individual components. We develop a system to verify our framework. First, it has a wireless sensor network to collect indoor, outdoor temperature and electricity expenses of the heating or air-conditioning devices. Second, we build an energy-temperature correlation model for the energy expenses and the corresponding room temperature. Third, we develop room scheduling algorithms. In detail, we first extend the current sensor hardware so that it can record the electricity expenses in re-heating or re-cooling a room. As the sensor network needs to work unattendedly, we develop a hardware board for long-range communications so that the Imote2 can send data to a remote server without a computer relay close by. An efficient two-tiered sensor network is developed with our extended Imote2 and TelosB sensors. We apply laws of thermodynamics and build a correlation model of the energy needed to re-cool a room to a target temperature. Such model requires parameter calibration and uses the data collected from the sensor network for model refinement. Armed with the energy-temperature correlation model, we develop an optimal algorithm for a specified case, and we further develop two fast heuristics for different practical scenarios. Our demo system is validated with real deployment of a sensor network for data collection and thermodynamics model calibration. We conduct a comprehensive evaluation with synthetic room and meeting configurations, as well as real class schedules and classroom topologies of The Hong Kong Polytechnic University, academic calendar year of Spring 2011. We observe 20% energy savings as compared with the current schedules.
    ACM Transactions on Sensor Networks 11/2013; 10(1). DOI:10.1145/2529050 · 1.46 Impact Factor
  • Chao Ma, Fahad Al-dhelaan, Peng-Jun Wan
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper addresses the joint selection and power assignment of a largest number of given links which can communicate successfully at the same time under the physical interference model. For this optimization problem, we present a constant-approximation algorithm with improved performance over existing approximation algorithms. In addition, both the algorithm design and analysis are applicable to arbitrary path-loss exponent and arbitrary dimension of the deployment space.
    Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications; 08/2013
  • Chao Ma, Fahad Al-dhelaan, Peng-Jun Wan
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper studies the problem of selecting a maximum independent set of links with a fixed monotone and sublinear power assignment under the physical interference model. The best-known approximation bound for this problem is a very large constant. In this paper, we present an approximation algorithm for this problem, which not only has a much smaller approximation bound but also produces an independent set of links with a stronger property, i.e., strong independence.
    Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications; 08/2013
  • Chao-Min Su, Chih-Wei Yi, Peng-Jun Wan
    [Show abstract] [Hide abstract]
    ABSTRACT: A wireless node is called isolated if it has no links to other nodes. The number of isolated nodes in a wireless network is an important connectivity index. However, most previous works on analytically determining the number of isolated nodes were not based on practical channel models. In this work, we study this problem using a generic probabilistic channel model that can capture the behaviors of the most widely used channel models, including the disk graph model, the Bernoulli link model, the Gaussian white noise model, the Rayleigh fading model, and the Nakagami fading model. We derive the expected number of isolated nodes and further prove that their distribution asymptotically follows a Poisson distribution. We also conjecture that the nonexistence of isolated nodes asymptotically implies the connectivity of the network, and that the probability of connectivity follows the Gumbel function.
    IEICE Transactions on Communications 02/2013; E96.B(2):595-604. DOI:10.1587/transcom.E96.B.595 · 0.33 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: For wireless link scheduling in multi-channel multi-radio wireless networks aiming at maximizing (concurrent) multi-flow, constant-approximation algorithms have recently been developed in [11]. However, the running time of those algorithms grows quickly with the number of radios per node (at least in the sixth order) and the number of channels (at least in the cubic order). Such poor scalability stems intrinsically from the exploding size of the fine-grained network representation upon which those algorithms are built. In this paper, we introduce a new structure, termed as concise conflict graph, on the node-level links directly. Such structure succinctly captures the essential advantage of multiple radios and multiple channels. By exploring and exploiting the rich structural properties of the concise conflict graphs, we are able to develop fast and scalable link scheduling algorithms for either minimizing the communication latency or maximizing the (concurrent) multi-flow. These algorithms have running time growing linearly in both the number of radios per node and the number of channels, while not sacrificing the approximation bounds.
    INFOCOM, 2013 Proceedings IEEE; 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Static greedy link schedulings have much simpler implementation than dynamic greedy link schedulings such as Longest-queue-first (LQF) link scheduling. However, its stability performance in multi-channel multi-radio (MC-MR) wireless networks is largely under-explored. In this paper, we present a stability subregion with closed form of a static greedy link scheduling in MC-MR wireless networks under the 802.11 interference model. By adopting some special static link orderings, the stability subregion is within a constant factor of the stable capacity region of the network. We also obtain constant lower bounds on the throughput efficiency ratios of the static greedy link schedulings in some special static link orderings.
    INFOCOM, 2013 Proceedings IEEE; 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Maximizing the wireless network capacity under physical interference model is notoriously hard due to the nonlocality and the additive nature of the wireless interference under the physical interference model. This problem has been extensively studied recently with the achievable approximation bounds progressively improved from the linear factor to logarithmic factor. It has been a major open problem whether there exists a constant-approximation approximation algorithm for maximizing the wireless network capacity under the physical interference model. In this paper, we improve the status quo for the case of linear transmission power assignment, which is widely adopted due to its advantage of energy conservation. By exploring and exploiting the rich nature of the wireless interference with the linear power assignment, we develop constant-approximation algorithms for maximizing the wireless network capacity with linear transmission power assignment under the physical interference model, in both the unidirectional mode and the bidirectional mode.
    INFOCOM, 2013 Proceedings IEEE; 01/2013
  • Source
    Yu Cheng, Hongkun Li, Peng-Jun Wan, Xinbing Wang
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a theoretical analysis of the maximum throughput of a wireless mesh backhaul network that is achievable over a practical carrier sense multiple access with collision avoidance (CSMA/CA) medium access control (MAC) protocol. We resort to the multicommodity flow (MCF) formulation augmented with the conflict-graph constraints, whereas we use a novel approach to take into account the collision overhead in the distributed CSMA/CA MAC. Such overhead due to random access has been ignored by existing MCF-based capacity studies, which assume impractical centralized scheduling and result in aggressive capacity planning, which is unachievable over the CSMA/CA MAC. This paper makes the following three main contributions: 1) we develop a generic method of integrating the CSMA/CA MAC analysis with the MCF formulation for optimal network capacity analysis, which readily generates an upper bound of the network throughput; 2) we define a new concept of CSMA/CA clique and theoretically study its relationship to a CSMA/CA area in terms of throughput; and 3) using the CSMA/CA clique as a tool, we derive a lower bound of the network throughput achievable over the CSMA/CA MAC by clique-based MCF formulation. NS-2 simulation results are presented to demonstrate the tightness of the upper and lower bounds that are newly developed, compared to those based on the MCF formulation assuming a slotted system and centralized scheduling.
    IEEE Transactions on Vehicular Technology 09/2012; 61(7):3151-3165. DOI:10.1109/TVT.2012.2204411 · 2.64 Impact Factor
  • Yu Cheng, Hongkun Li, Peng-Jun Wan
    [Show abstract] [Hide abstract]
    ABSTRACT: A wide range of next generation wireless networks are based on the multiradio multichannel (MR-MC) network model. A full exploration of the MR-MC wireless network capacity incurs challenging cooperative networking issues including transmission cooperation, resource allocation cooperation, and cross-layer protocol cooperation. In this article, rather than focus on protocol designs for specific cooperative networking issues, we present a generic theoretical framework that could guide the protocol or algorithm development to approach the maximum network capacity. Based on our multidimensional conflict graph (MDCG) tool, we could achieve a cross-layer linear programming framework to study the optimal cooperative networking in two complementary aspects: optimal network dimensioning and throughputoptimal control. While certain NP-hard computing issues hindered the MR-MC network optimization for a long time, the MDCG-based framework can readily generate simple polynomial and distributed algorithms with guaranteed capacity region.
    IEEE Wireless Communications 04/2012; 19(2):66-73. DOI:10.1109/MWC.2012.6189415 · 6.52 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
    Proceedings - IEEE INFOCOM 01/2012; DOI:10.1109/INFCOM.2012.6195758
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Longest-queue-first (LQF) link scheduling is a greedy link scheduling in multihop wireless networks. Its stability performance in single-channel single-radio (SC-SR) wireless networks has been well studied recently. However, its stability performance in multi-channel multi-radio (MC-MR)wireless networks is largely under-explored. In this paper, we present a stability subregion with closed form of the LQF scheduling in MC-MR wireless networks, which is within a constant factor of the network stability region. We also obtain constant lower bounds on the efficiency ratio of the LQF scheduling in MC-MR wireless networks under the 802.11 interference model or the protocol interference model.
  • Source
    Minming Li, Peng-Jun Wan, F. Frances Yao
    [Show abstract] [Hide abstract]
    ABSTRACT: Connected dominating set (CDS) in unit disk graphs has a wide range of applications in wireless ad hoc networks. A number of approximation algorithms for constructing a small CDS in unit disk graphs have been proposed in the literature. The majority of these algorithms follow a general two-phased approach. The first phase constructs a dominating set, and the second phase selects additional nodes to interconnect the nodes in the dominating set. In the performance analyses of these two-phased algorithms, the relation between the independence number α and the connected domination number γ c of a unit-disk graph plays the key role. The best-known relation between them is . In this paper, we prove that α≤3.4306γ c +4.8185. This relation leads to tighter upper bounds on the approximation ratios of two approximation algorithms proposed in the literature.
    Algorithmica 12/2011; 61:1000-1021. DOI:10.1007/s00453-011-9512-7 · 0.57 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We address a new and general maximal lifetime problem in sensor-target surveillance. We assume that each sensor can watch at most k targets (k ≥ 1) and each target should be watched by ft sensors (h ≥ 1) at any time. The problem is to schedule sensors to watch targets and forward the sensed data to a base station such that the lifetime of the surveillance network is maximized. This general problem includes the existing ones as its special cases (k = 1 and h = 1 in and k = 1 and h ≥ 2 in). It is also important in practice because some sensors can monitor multiple or all targets within their surveillance ranges and multisensor fusion (i.e., watching a target by multiple sensors) gives better surveillance results. The problem involves several subproblems and one of them is a new matching problem called (k, h)-matching. The (k, h)-matching problem is a generalized version of the classic bipartite matching problem (when k = h = 1, (k, h)-matching becomes bipartite matching). We design an efficient (k, h)-matching algorithm to solve the (k, h)-matching problem and then solve the general maximal lifetime problem. As a byproduct of this study, the (k, h)-matching problem and the proposed (k, h)-matching algorithm can potentially be applied to other problems in computer science and operations research.
    IEEE Transactions on Parallel and Distributed Systems 11/2011; DOI:10.1109/TPDS.2011.42 · 2.17 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Link scheduling is a fundamental design issue in multihop wireless networks. All existing link scheduling algorithms require the precise information of the positions, and/or communication/interference radii of all nodes. For practical networks, it is not only difficult or expensive to obtain these parameters, but also often impossible to get their precise values. The link scheduling determined by the imprecise values of these parameters may fail to guarantee the same approximation bounds of the link scheduling determined by precise values. Therefore, the existing link scheduling algorithms lack performance robustness. In this paper, we propose a robust link scheduling, which can be easily computed with only the information on whether a given pair of links have conflict or not and therefore is robust. In addition, our link scheduling does not compromise the approximation bound and indeed sometimes can achieve better approximation bound. Particularly, under the 802.11 interference model, its approximation bound is 16 in general and 6 with uniform interference radii, an improvement over the respective best-known approximation bounds 23 and 7.
    INFOCOM, 2011 Proceedings IEEE; 05/2011
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Link scheduling is a fundamental problem in multihop wireless networks because the capacities of the communication links in multihop wireless networks, rather than being fixed, vary with the underlying link schedule subject to the wireless interference constraint. The majority of algorithmic works on link scheduling in multihop wireless networks assume binary interference models such as the 802.11 interference model and the protocol interference model, which often put severe restrictions on interference constraints for practical applicability of the link schedules. On the other hand, while the physical interference model is much more realistic, the link scheduling problem under physical interference model is notoriously hard to resolve and been studied only recently by a few works. This paper conducts a full-scale algorithmic study of link scheduling for maximizing throughput capacity or minimizing the communication latency in multihop wireless networks under the physical interference model. We build a unified algorithmic framework and develop approximation algorithms for link scheduling with or without power control.
    INFOCOM, 2011 Proceedings IEEE; 05/2011

Publication Stats

4k Citations
90.60 Total Impact Points

Institutions

  • 1997–2014
    • Illinois Institute of Technology
      • Department of Computer Science
      Chicago, Illinois, United States
  • 2008–2013
    • IIT Research Institute (IITRI)
      Chicago, Illinois, United States
  • 2009
    • University of Illinois at Chicago
      • Department of Computer Science
      Chicago, Illinois, United States
  • 2006–2008
    • City University of Hong Kong
      • Department of Computer Science
      Chiu-lung, Kowloon City, Hong Kong
  • 2005
    • The University of Hong Kong
      • Department of Computer Science
      Hong Kong, Hong Kong
    • Wuhan University
      Wu-han-shih, Hubei, China
  • 1997–2005
    • University of Minnesota Duluth
      • Department of Computer Science
      Duluth, MN, United States
  • 2000
    • Pace University
      • Program in Computer Science
      New York City, NY, United States
  • 1993
    • Chinese Academy of Sciences
      • Institute of Applied Mathematics
      Peping, Beijing, China