# Stability conditions for a decentralised medium access algorithm: single- and multi-hop networks

We consider a decentralised multi-access algorithm, motivated primarily by the control of transmissions in a wireless network. For the finite single-hop network with arbitrary interference constraints we prove stochastic stability under the natural conditions. For the infinite (as well as finite) single-hop network, we obtain broad rate-stability conditions. We also consider symmetric (in terms of both arrival intensities and routing) finite multi-hop networks and show that the natural condition is sufficient for stochastic stability.

## Authors

• 4 publications
• 5 publications
10/16/2021

### Design of Link-Quality-prediction-based Software-Defined Wireless Sensor Networks

In wireless multi-hop networks, the instability of the wireless links le...
03/12/2018

### Multi-Hop Routing in Covert Wireless Networks

In covert communication, Alice tries to communicate with Bob without bei...
06/05/2018

### X-FDR: A Cross-Layer Routing Protocol for Multi-hop Full-Duplex Wireless Networks

The recent developments in self-interference (SI) cancellation technique...
11/03/2020

### Multi-hop Routing with Proactive Route Refinement for 60 GHz Millimeter-Wave Networks

Fundamental requirements of mmWave systems are peak data rates of multip...
10/26/2017

### Interference Queueing Networks on Grids

Consider a countably infinite collection of coupled queues representing ...
12/29/2020

### A Number Theoretic Approach for Fast Discovery of Single-Hop Wireless Networks

Interference management has become a key factor in regulating transmissi...
11/13/2020

### On the stability properties of Gated Recurrent Units neural networks

The goal of this paper is to provide sufficient conditions for guarantee...
##### This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

## 1 Introduction

We consider a model motivated by wireless networks. A key feature of wireless transmissions is that they interfere with each other, especially if the receivers are in close proximity, and this interference may prevent some of the simultaneous transmissions from being received correctly. This creates the need for the design of algorithms regulating the behaviour of transmitters in wireless networks, so that simultaneous interfering transmissions do not occur at all, or occur rarely.

The transmitter-receiver pairs in a network are represented by vertices (we will refer to them as nodes) on a graph, and an edge between two vertices is present if the corresponding transmissions interfere with each other. Thus, the resulting interference graph represents the (interference) structure of the network.

We consider both single- and multi-hop networks. In a single-hop network jobs (or messages to be transmitted) arrive at nodes in a network and, upon a successful transmission, leave the network. The dependence between states of different nodes exists because the interference graph imposes constraints on simultaneous transmissions. In a multi-hop network, a message, upon successful transmission at one node, may leave the network or may move to another node, where it needs to be transmitted again. Thus, multi-hop networks add a further layer of complexity, as the states of the nodes are dependent not only due to interference constraints, but in this case also due to message movement between the nodes.

We are interested in stability of a network. In finite networks by stability we mean the stochastic stability of the nodes’ queues, where messages wait for transmission. One usually calls a (transmission scheduling) algorithm maximally stable if it guarantees stability if such is feasible at all, under at least one algorithm. The celebrated BackPressure (sometimes referred to as MaxWeight) algorithm introduced in [18] is maximally stable. It is however centralised, i.e. it requires the presence of a central entity that is aware of the state of the entire network. This is not practical in wireless networks that tend to be large and ever-changing.

There is thus the need for designing decentralised algorithms where each node regulates its behaviour on its own, without any global knowledge. In principle, decentralised behaviour may lead to conflicts, when several interfering transmissions will be attempted simultaneously, and the messages will not be received. We consider the so-called CSMA (Carrier Sense Multiple Access) networks where each transmitter can sense if a neighbouring node is transmitting and will never initiate an interfering transmission. Conflicts are thus avoided in CSMA networks.

In this paper, it is not our goal to design decentralised algorithms (or, protocols) that are maximally stable. We study a different question: what is the stability performance of some simple specific decentralised protocols? We consider the following protocol. Assume that the network is finite. Assume also that time is slotted, i.e. arrivals happen at discrete time instances denoted , all transmission times are equal to , and transmissions start at the beginning of a unit-long time slot and complete at its end. Assume that at the beginning of each time slot, each message is assigned a random number, drawn independently from some fixed absolutely continuous distribution; the lower this number, the higher the message transmission priority in the slot. Then, a given message is transmitted in a slot, if and only if its priority is the highest among all messages within its neighborhood, which includes its own node and all adjacent (neighbouring) nodes. We note that this protocol is different from that considered in [14]. First, in [14] the nodes compete for access, as opposed to individual messages. Second, the protocol in this paper is more conservative than that in [14] in that, a message will stay silent in a slot even if all higher priority messages in its neighbourhood do not actually transmit in the slot.

On the face of it, the protocol described in the previous paragraph is centralised, as priorities need to be assigned. It is, however, easily implemented in a decentralised fashion (with an arbitrarily small loss of efficiency), for example as follows. Let an arbitrarily small duration at the beginning of each time slot be fixed. Assume that each actual (payload) transmission lasts , while the initial

-long interval within each time slot is devoted to medium-access competition. At the beginning of each slot there are no transmissions. Each message starts an “access transmission” at a random time uniformly distributed in

, independent of everything else; the access transmission stops at (or before) time . A message starts actual (payload) transmission at time if and only if its access transmission was the first within its neighbourhood.

In the rest of the paper, for simplicity we consider a “cleaner” version of the protocol, as described in the previous paragraph (and in Section 2) that ignores the loss of an proportion of the throughput.

The following example illustrates the conservative nature of the protocol. Consider nodes, with interference graph being a “circle”, so that either nodes and , or nodes and can transmit simultaneously. Assume that, in a given time slot, the message with the highest priority is located at node , the message with the second-highest priority is located at node and the message with the third-highest priority is located at node . Under the algorithm considered here, only the first message will be transmitted in this slot, when in fact nodes and could successfully transmit simultaneously. Of course, under other priority orderings, transmission of two messages will occur.

Denote by the neighbourhood of node in the interference graph (all neighbours of the node and the node itself). Denote by the number of messages at node at the beginning of a time slot. It is easy to see that node

will transmit a message with probability

 φi=Xi∑j∈NiXj. (1)

A model closely related to ours has been considered in a recent paper [13] (see also [12]). It is a single-hop network with nodes located on a grid. The model is in continuous time

, with each message having an exponentially distributed size with unit mean.

All messages may transmit simultaneously, with the instantaneous transmission rate depending on the interference from the messages in the neighborhood. (The neighborhood in [13] is defined slightly more generally.) A standard assumption that a message transmission rate is proportional to its Signal-to-Noise-Ratio is adopted in [13], which leads to a node transmission rate given exactly by (1). The model in [13] is symmetric in that the message arrival rates at all nodes are equal. The authors focus on infinite-grid networks and are interested in their stability. The authors define this as the finiteness of the minimal stationary regime for the system starting with all queues being empty (see [13] for more details). They show that a network is stable in this sense under the natural condition on the message arrival rates. The main tool in their analysis is monotonicity, i.e. the property that if one network starts with an initial condition dominating that of another, there exists a coupling preserving this dominance at all times.

In the single-hop scenario, we consider arbitrary networks: finite or infinite, arbitrary interference graph, arbitrary arrival intensities. For finite single-hop networks we prove that the system is stochastically stable if the arrival rates belong to a certain set. For infinite single-hop networks we obtain a rather broad sufficient condition for the rate-stablity which is the property that, starting from any fixed initial state, the growth rates of the queues are sub-linear in time.

We also consider finite multi-hop networks; here we additionally assume that a network is symmetric: it is a regular graph, with equal exogenous arrival rates at the nodes and with a message path through the network being the standard random walk (until the message leaves the network). In the multi-hop setting, a further complication arises from the fact that monotonicity does not hold. We prove directly that the network is stochastically stable under a natural condition. Our approach is not based on monotonicity, in either setting.

Our stability proofs use the fluid-limits technique. The discrete-time setting motivating our work and the continuous-time network motivating [13]

share the same fluid limits, and thus our results are valid in the continuous-time setting too. Note also that the random variables representing the number of successful transmissions from all nodes in the same time slot in our model are not independent. However, our stability results also apply to a different discrete-time model, where (perhaps rather unrealistically) each station transmits a message with a probability given by (

1); again, this is due to the fact that this model has the same fluid-limit dynamics as ours.

Another important concept in wireless networks is utility maximisation. Utility-optimal algorithms are known to guarantee maximal stability for finite single-hop networks, under some assumptions on the utility functions. However, these algorithms are centralised as the average service rates assigned to nodes form a solution to a global optimisation problem. An important example of such algorithms is presented by the well-known -fair algorithms (see [8, 9, 10] for introduction of the fair-allocation concepts and [1, 6] for stability proofs). In -fair algorithms the average rates are such that

 ¯¯¯¯φ∈argmax¯¯¯μ∈C∑iXi11−α(μiXi)1−α,  when  α>0, α≠1,

or

 ¯¯¯¯φ∈argmax¯¯¯μ∈C∑iXilog(μi/Xi),  when  α=1.

In the finite single-hop setting we provide two proofs of stochastic stability, for the arrival rates within a certain (natural) set . The first proof follows from a much more general result for monotone -homogeneous service rates, which is of interest on its own and may have other applications. Our infinite-system rate stability proof is based on the same ideas. We provide a second proof for finite systems, as it is based on discovering an important property of the rates (1): they in fact happen to be -fair in , with . We believe this property to be interesting in its own right too as it presents an example of a decentralised protocol which happens to be centrally optimal in a certain sense, and it is known to imply stochastic stability in finite single-hop networks.

It is known that utility-maximising algorithms, with the exception of proportionally-fair algorithms (i.e. -fair algorithms with ; see [19, 2] for a treatment of some of the multi-hop scenarios), in general do not guarantee stability in multi-hop networks. Therefore our result on the fairness of the rates (1) does not imply stability in the multi-hop setting. In Section 3.2 we present our main result in the finite multi-hop setting stating that a natural stability property does hold under our algorithm (which happens to be -fair) for a class of symmetric networks. Specifically, these networks are such that the interference graph is regular, the exogenous arrival rates to all nodes are equal, and upon a successful transmission a message may either leave the network or move to a neighbour node chosen uniformly at random. We show stochastic stability under a natural condition on the per-node exogenous arrival rate.

The paper is organised as follows. We define our model in Section 2 and then present our main results in Section 3 (for single-hop networks in Section 3.1 and for multi-hop networks – in Section 3.2). We then comment on the construction and main properties of Fluid Sample Paths for our models in Section 4. The proofs of our main results are presented in Section 5.2 for the finite single-hop case, in Section 5.3 for the infinite single-hop case, and in Section 6 for the multi-hop case. We discuss some open problems in Section 7.

Basic notation. We will use the following notation throughout: and are the sets of real and real non-negative numbers, respectively;

means (finite- or infinite-dimensional) vector

; for a finite-dimensional vector , ; for a set of functions and a vector , denotes the vector ; vector inequalities are understood component-wise; is the right derivative; – the lower right Dini derivative; ; we also use the convention that .

## 2 Model and notation

Denote by the set of nodes represented by vertices on a graph, and by the set of its edges. The set may be finite (in which case we will refer to the network as finite) or countable (in which case we will refer to the network as infinite). Denote by the (finite or infinite) cardinality of .

For a vertex , denote by its neighbourhood. We assume throughout that is finite for each , the graph is connected, and that the neighbourhood relationship is symmetric (or that the graph is undirected), i.e. if , then .

Each node has an infinite buffer for storing messages but there is no queue. Time is slotted, and at the beginning of each time slot first transmissions are initiated, and then arrivals happen. Each transmission time is equal to .

At the beginning of each time slot, every message in the system is assigned a random number which is drawn, independently of everything else, from a certain fixed absolutely continuous distribution; the smaller this number, the higher the message transmission priority. A message is transmitted if and only if it has the highest priority in its neighbourhood, i.e. node transmits a message if that message’s priority is the maximal over all the messages in . We refer the reader to the introduction for an explanation of how this may be implemented in a decentralised way, by using Uniform distribution on a small interval, with an arbitrarily small loss of throughput.

At each time slot , a random number new messages arrive at node . We assume that are i.i.d. with .

Throughout the paper we use notation

 φi(¯¯¯p)=pi∑j∈Nipj,  ¯¯¯¯φi(¯¯¯p)=(φi(¯¯¯p)), (2)

where is a vector with finite non-negative components. By convention, when .

## 3 Main results

The results are split into two subsections covering single- and multi-hop networks. The subsection on single-hop networks contains results for both finite and infinite networks.

### 3.1 Single-hop network

For the single-hop network we make no extra assumptions on graph apart from those listed in Section 2. We assume that, upon a successful transmission, a message leaves the system. The evolution of the state of the queue of node may then be written as

 Xi(k+1)=Xi(k)+ξi(k)−ηi(k),

where by we denoted the state of the queue of node at time , and by - the number of messages leaving node during the -th time slot. The random variable can only take values and , and it is easy to see that, as priorities are chosen independently from the same fixed distribution,

 P(ηi(k)=1|¯¯¯¯¯X(k)=¯¯¯¯¯X)=φi(¯X)=Xi∑j∈NiXj.

Denote

 C={¯¯¯λ:¯¯¯λ≤¯¯¯¯φ(¯¯¯p)for some¯¯¯p}. (3)

We will call a finite network stochastically stable

if the countable Markov chain

is positive recurrent.

###### Theorem 1.

Consider a finite network. If for some , then the system is stochastically stable.

We present a proof of Theorem 1 in Section 5.2.

###### Corollary 2.

In a finite symmetric network, where the graph is -regular (so that each vertex has degree ) and for each , the condition of Theorem 1 is equivalent to the requirement that . In particular, for a network of nodes located on a circle with the same arrival intensity at each node, guarantees stability.

Indeed, if , then the vector is component-wise upper-bounded by the vector which belongs to the set trivially (one needs to take the vector to verify this). Assume now that for some the vector is component-wise smaller than a vector . Then

 1λ>∑j∈Nipjpi

for each , and if we add up these inequalities, we obtain

 Nλ>∑i∑j∈Nipjpi=12∑i∑j∈Ni(pjpi+pipj)≥mN,

which implies .

###### Remark 3.

As the proof of Theorem 1 is based on the fluid limits, its results are also valid for a continuous version of the model similar to that of [13] (see also the introduction to this paper for an explanation of the connection between models).

A network (finite or infinite) is called rate-stable, if w.p.1,

 limk→∞Xi(k)/k=0,   ∀i,

for any initial state with all components being finite, .

Rate-stability is a weaker property than the stochastic stability. The following result gives a sufficient condition for rate-stability.

###### Theorem 4.

The infinite or finite system is rate-stable if for some such that for all .

A proof of Theorem 4 is given in Section 5.3. (We actually prove a slightly more general fact there.)

### 3.2 Symmetric multi-hop networks with Geometric service requirements

In this section we restrict our attention to a finite -regular graph, . Assume that the access procedure is the same as before. Now however, upon service, a message leaves the system with probability , and goes to a neighbouring node with probability . Assume that arrival rate into each node is , so that the total workload for each node is (this follows from standard rate-balance equations).

One can think of each message needing a Geometric number of successful transmissions to leave the system and, conditionally on not leaving the system upon a successful transmission, performing a simple random walk on the graph (choosing a neighbouring node uniformly at random).

###### Theorem 5.

Suppose the system graph is finite -regular, . Then, if , the system is stochastically stable.

We provide a proof of Theorem 5 in Section 6.

###### Remark 6.

Similarly to Remark 3, our results in the multi-hop setting hold for a continuous-time version of the model.

## 4 Fluid limits

Our main results are based on the fluid-limit technique (see [11, 4, 16]). For the application of this technique to discrete time processes, see e.g. [3, 17]. In fact the proof of Lemma 7 below follows the exact same lines as that of [17, Theorem 2], for a model close to ours, and is omitted here.

We consider the Markov chain and extend it to continuous time with the convention . Consider a sequence of processes , indexed by . Consider further their fluid-scaled versions

 ¯¯¯x(r)(t)=¯¯¯¯¯X(r)(rt)r,  t≥0,

and assume that

 ¯¯¯x(r)(0)→¯¯¯x(0),

as , for some fixed with all components being finite, .

###### Lemma 7.

For either the single- or the multi-hop setting, all processes (for all ) may be constructed on a common probability space, such that, with probability , any subsequence of realisations of contains a further subsequence such that each converges, uniformly on compact sets, to a Lipshitz function . Moreover, the limiting functions are uniformly Lipschitz. The corresponding limiting vector-function is called a fluid sample path (FSP) with initial state .

FSPs are formally defined as possible limits of the realisations of

, with common “driving” processes’ realisations, satisfying the functional strong law of large numbers. This definition/construction is quite standard (again, see e.g. the proof of

[17, Theorem 2]) and we omit it here.

For a finite system, to establish stochastic stability (positive recurrence) of the Markov chain , it suffices to prove that for some and any sequence of processes , with , is such that

 limsupr→∞E1r∥¯¯¯¯¯X(r)(rT)∥≤1−ε.

It is a standard result when applying fluid-limit techniques, that for the above to hold, it is sufficient to show that for some and , any FSP with is such that

 ||¯¯¯x(T)||≤1−ε. (4)

For a finite or infinite system, to show rate-stability, it suffices to prove (see Lemma 13 below) that any FSP starting from zero initial state (all ), stays in zero state at all times, . This follows from the rate-stability definition and Lemma 7.

## 5 Single-hop network

### 5.1 FSP properties

We start by establishing properties of the FSP dynamics in Lemma 8. The proof is, once again, standard and is omitted here.

###### Lemma 8.

Any FSP in the single-hop case satisfies the following conditions:

 xi(t)>0impliesx′i(t)=λi−φi(¯¯¯x(t)),   for almost all t≥0, (5)
 [xi(t)=0 and ∑j∈Nixj(t)>0]impliesd+dtxi(t)=λi. (6)

In particular, by property (6), any FSP is such that, for a fixed , implies that for all sufficiently close to . Furthermore, if the network is finite, any FSP is such that implies that for all sufficiently close to .

A proof of Lemma 8 may be given following the exact same lines as that of [17, Theorem 2], for a model close to ours, and we omit it here.

### 5.2 Proof of Theorem 1

We present two different proofs of Theorem 1. One proof of (4), and then of Theorem 1, follows from the following much more general result.

For a function , mapping a finite-dimensional positive orthant , , into itself, define

 D={¯¯¯λ∈RN+:¯¯¯λ≤¯¯¯¯ψ(¯¯¯p)for some¯¯¯p}. (7)
###### Lemma 9.

Consider a family of Lipschitz trajectories , in , , which satisfy the following conditions:

 xi(t)>0impliesx′i(t)=λi−ψi(¯¯¯x(t)),  for almost % all t≥0,  for any i, (8)
 ∑ixi(t)>0impliesxi(τ)>0, for all i, % for all τ>t sufficiently close to t, (9)

where the function is such that:

(A) each is non-decreasing in for all ;

(B) each is -homogeneous, i.e. for all and for all .

Assume that is such that for some . Then for any constants , there exists such that, for any such trajectory with ,

 ∥x(T)∥≤δ.

Proof of Lemma 9.

Fix a vector such that

 ¯¯¯ν≤¯¯¯¯ψ(¯¯¯p)

for every and consider the function

 F(¯¯¯y)=maxi(yipi).

For ease of notation, in the rest of the proof we drop the index and make the dependence of on implicit.

Denote

 K={k:k∈argmaxi(xipi)}.

The function is Lipschitz, because all are Lipschitz. The time points , where the derivatives of all and of exist, are called regular. Almost all all points (with respect to Lebesgue measure) are regular. Then, due to [5, Lemma 2.8.6], at any regular point of for any . The derivative of the function is at a regular point is then

 (F(¯¯¯x))′=1pk(λk−ψk)

with an arbitrary . Note that, as for any and for any , due to property (A),

 ψk =ψk(¯¯¯x)≥ψk(xkp1pk,…,xkpk−1pk,xk,xkpk+1pk,…,xkpNpk) =ψk(xkp1pk,…,xkpk−1pk,xkpkpk,xkpk+1pk,…,xkpNpk) =ψk(¯¯¯p)=νi

where in the last step we used property (B).

Noting that there exists such that for every , we obtain

 (F(¯¯¯x))′=1pk(λk−νk)+1pk(νk−ψk)<−εpk.

This implies that is negative, bounded away from , as long as is positive, bounded away from . In particular, if “hits” , it stays at thereafter. This concludes the proof of Lemma 9.

Theorem 1 follows from Lemma 9 as the rates clearly satisfy conditions (A) and (B).

###### Remark 10.

Lemma 9 is rather general and relates to the so-called cooperative dynamical systems (see, e.g. [7, 15]). We believe that this result is interesting on its own and may have other applications. This result also allows, in an obvious fashion, to obtain stability conditions for networks with a more general notion of neighbourhood considered in [13]).

We also present a different proof of Theorem 1, which is specific to our model and is based on a global optimality of the rates . We think that this optimality is interesting on its own as it is an important structural property of the rates, and as it provides an example of a decentralised algorithm which maximises a global utility function. We also present a simple proof showing stability of algorithms maximising utility functions over a set, without requiring convexity of the set.

The remainder of this second proof consists of the following steps, which correspond to two lemmas below:

1. We show that the FSPs of this model are such that the “service rates” the nodes receive are utility maximising (in fact -fair) in the set . This property is proved in Lemma 11;

2. The property (4) of the FSPs (which is sometimes referred to as stability of FSPs), and hence the stability of the underlying Markov chain, follows from the utility-maximisation property of the “service rates.” We only need to note that this fact is usually proved for convex sets of possible rates, whereas our set is not convex. However, convexity is in fact not needed in the stability proof, and we provide a proof for any sets, based on the proof of [17, Theorem 2]; this is done in Lemma 12.

###### Lemma 11.

For any with for all , the rates are -fair in the set (see the Introduction of this paper or, e.g. [1] for definition of -fairness).

Indeed, due to the definition of the set , for any ,

 ∑ixi(μixi)−1≥∑ixi(pi(∑j∈Nipj)xi)−1

for the corresponding vector . Hence, it is sufficient to show that

for all vectors .

Note that the LHS of the above is equal to . Consider now

 ∑ixi(pi(∑j∈Nipj)xi)−1=∑ix2i⎛⎝1+∑j∈Ni,j≠ipjpi⎞⎠=∑ix2i+12∑i∑j∈Ni,j≠i(x2ipjpi+x2jpipj).

For any and ,

 x2ipjpi+x2jpipj≥2xixj,

and the equality is possible if and only if , which is equivalent to . Therefore we obtain

 ∑ixi(∑j∈Nipjpixi)−1≥∑ix2i+∑i∑j∈Ni,j≠ixixj,

and the equality is possible if and only if for all and . This implies that has to be a constant for each , as the graph is connected. This concludes the proof of Lemma 11. ∎

The result of Theorem 1 now follows from stability of FSPs under -fair algorithms. One only needs to note that such proofs are usually given for convex sets, but convexity is not in fact needed, and stability may be proved following the lines of the proof of Theorem 2 in [17], Section 8, where it was given in the case . The proof for far more general rate allocations is essentially the same and we provide it here for completeness.

###### Lemma 12.

Let be a compact coordinate-convex subset of . (Coordinate-convex means that and imply .) Let , for each , be an increasing differentiable concave function (the case when as is allowed). Let , for each , be a continuous non-decreasing function such that and for .

Consider a family of Lipschitz trajectories , in , which satisfy the following conditions:

 xi(t)>0impliesx′i(t)=λi−ψi(¯¯¯x(t)),   for almost all t≥0, (10)
 ∑ixi(t)>0impliesxi(τ)>0, for all i, % for all τ>t sufficiently close to t, (11)

where the rates satisfy

 ¯¯¯¯ψ∈argmax¯¯¯μ∈C∑igi(xi)hi(μi). (12)

Assume that is such that for some . Then for any constants , there exists such that, for any such trajectory with ,

 ∥x(T)∥≤δ.

Proof of Lemma 12. In this proof, we will drop the index for ease of notation. We will also write simply , with its dependence on being implicit.

Property (11) implies that for all , for , where is the first time (if any) when all “hit” simultaneously. Consider a trajectory in this interval .

Note that there exists such that for each . Denote by

 F(¯¯¯y)=N∑i=1Gi(yi)h′i(νi)

with , and note that

 (F(¯¯¯x))′ =N∑i=1h′i(νi)gi(xi)(λi−ψi)=N∑i=1h′i(νi)gi(xi)(λi−νi)+N∑i=1h′i(νi)gi(xi)(νi−ψi) <−εN∑i=1h′i(νi)gi(xi)+N∑i=1h′i(νi)gi(xi)(νi−ψi). (13)

As , due to (12),

 N∑i=1gi(xi)hi(ψi)≥N∑i=1gi(xi)hi(νi).

Using this and the concavity of the functions , we have

 0≤N∑i=1gi(xi)(hi(ψi)−hi(νi))≤N∑i=1gi(xi)h′i(νi)(ψi−νi).

This, together, with (5.2), implies that

 (F(¯¯¯x))′<−εN∑i=1h′i(νi)gi(xi).

We see that is negative, bounded away from , as long as is positive, bounded away from . In particular, if “hits” , it stays at thereafter. This concludes the proof. ∎

It is easy to see that the condition (6) implies (11) as the graph is connected. The result of Theorem 1 now follows if we take and .

### 5.3 Proof of Theorem 4

Recall that Theorem 4 is for the infinite, as well as finite, system. It suffices to prove the following.

###### Lemma 13.

Any FSP starting from zero initial state (all ), stays in zero state at all times, .

Proof of Lemma 13. Consider any FSP with zero initial state. Denote . This function is Lipschitz, because all are uniformly Lipschitz and all . Time points where all derivatives and exist, are called regular. Almost all points (with respect to Lebesgue measure) are regular. We will show that at any regular point , . (This will imply that cannot escape from .) Suppose not, and at some regular point , . If this is true, then there exists a positive function as , such that the following holds for any sufficiently small : (a) there exists such that the increment

 xi(t+δ)/pi−xi(t)/pi≥(η/2)δ, (14)

(b) for all , (c) for all and all . If we consider such an , we observe that for any regular , , where as . Therefore, for a sufficiently small and a corresponding , for all regular . This contradicts (14). ∎

## 6 Symmetric multi-hop networks with Geometric service requirements: Proof of Theorem 5

As in the single-hop case, we first present a Lemma on the conditions any FSP satisfies.

###### Lemma 14.

Any FSP for a multi-hop symmetric network satisfies the following conditions:

 xi(t)>0impliesx′i(t)=λi−φi(¯¯¯x(t))+(1−1/k)1m−1∑j∈Ni,j≠iφj(¯¯¯x(t)),   for almost all t≥0, (15)
 [xi(t)=0 and ∑j∈Nixj(t)>0]impliesd+ldtxi(t)≥λi. (16)

In particular, by property (16), any FSP for a finite network is such that implies that for all sufficiently close to .

Once again, a proof of Lemma 14 may be given following the exact same lines as that of [17, Theorem 2], for a model close to ours, and we omit it here.

We will omit the index in the remainder of the proof. Fix such that and consider the Lyapunov function , whose drift is

 ∑ixi⎛⎝λk−φi+∑j∈Ni,j≠i(1−1/k)1m−1φj⎞⎠ =λk∑ixi−1k∑xiφi+∑ixi⎛⎝−(1−1/k)φi+∑j∈Ni,j≠i(1−1/k)1m−1φj⎞⎠ <−εk∑ixi+1k(1m∑ixi−∑xiφi)+(1−1/k)∑iφi⎛⎝−xi+1m−1∑j∈Ni,j≠ixj⎞⎠ =−εk∑ixi+1k(1m∑ixi−∑xiφi)+(1−1/k)∑iφi(−xi+1m−1(xiφi−xi)) =−εk∑ixi+1k(1m∑ixi−∑xiφi)+(1−1/k)(−mm−1∑ixiφi+1m−1∑ixi) =−εk∑ixi+(1k+(1−1/k)mm−1)(1m∑ixi−∑xiφi) =−εk∑ixi+1m−1(m−1k)(1m∑ixi−∑xiφi).

Note now that

 1∑ixi∑xiφi=∑ixi∑ixi1∑j∈Nixjxi≥∑ixi∑i∑j∈Nixj=1m,

due to convexity of the function . It now follows that

 (12∑ix2i)′<−εk∑ixi.

From here the FSP property (4), and then Theorem 5, follows. ∎

## 7 Open problems

Our main result in the multi-hop setting only concerns symmetric (in terms of arrival intensities as well as routing) networks. We expect similar results to hold in greater generality. An interesting example is the following: assume that the graph is a circle, arrival intensities into each node are constant and equal to but the routing is not symmetric. Upon successful transmission, a message leaves the system with probability or goes to its neighbour on the right with probability . Rate-balance equations imply that the total workload of each node is and we expect that the condition guarantees stability in this model, as well as in the model with symmetric routing covered by Theorem 5. In fact, we conjecture that the same Lyapunov function as the one used in the proof of Theorem 5 has a negative drift in this scenario as well. Simple calculus shows that to prove this, one needs to show that

 N∑i=1xi(xi−xi+1)xi−1+xi+xi+1≥0

for all vectors , with the conventions that and .

We have ample numerical evidence in support of this hypothesis but currently lack a proof. If the inequality above is proved, it will imply, furthermore, that condition guarantees stability on the circle topology with arrival intensities equal to for each node, every message leaving the system upon a successful transmission with probability and for arbitrary (but same for all nodes) routing to neighbours if the message does not leave the system.

## References

• [1] T. Bonald, L. Massoulie (2001). Impact of fairness on Internet performance. ACM SIGMETRICS Performance Evaluation Review, 29, 82–-91.
• [2] M. Bramson, B. D’Auria, N. Walton (2017). Proportional switching in FIFO networks (2017). Opertations Research, 65, 2, 469–513.
• [3] E.G. Coffman, Jr. and A.L. Stolyar (2001). Bandwidth Packing. Algorithmica, 29, 70–88.
• [4] J.G. Dai (1995). On the Positive Harris Recurrence for Open Multiclass Queueing Networks: A Unified Approach Via Fluid Limit Models. Annals of Applied Probability, 5, 49–77.
• [5] J. G. Dai (1999). Stability of fluid and stochastic processing networks. MaPhySto Miscellanea Publication, 9.
• [6] G. De Veciana, T. Konstantopoulos, T. Lee (2001). Stability and performance analysis of networks supporting elastic services. IEEE/ACM Transactions on Networking, 9, 2–-14.
• [7] M. W. Hirsch (1985). Systems of differential equations that are competitive and cooperative: Convergence almost everywhere. SIAM Journal of Mathematical Analysis, 16, 423–-439.
• [8] F. P. Kelly, A. K. Maulloo, D. K. H. Tan (1998). Rate control for communication networks: Shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49, 237–-252.
• [9] J. Mo, J. Walrand (2000). Fair end-to-end window-based congestion control. IEEE/ACM Transactions on Networking, 8, 556–-567.
• [10] J. Roberts, L. Massoulie (2000). Bandwidth sharing and admission control for elastic traffic. Telecommunication Systems, 15, 185–-201.
• [11] A.N. Rybko and A.L. Stolyar (1992). Ergodicity of Stochastic Processes Describing the Operation of Open Queueing Networks. Problems of Information Transmission, 28, 199–220.
• [12] A. Sankararaman, F. Baccelli (2017). Spatial birth-death wireless networks. IEEE Transactions on Information Theory, 63(6), 3964–3982.
• [13] A. Sankararaman, F. Baccelli, S. Foss (2018). Interference queueing networks on grids. Preprint available on ArXiv.
• [14] S. Shneer, A. L. Stolyar (2018). Stability conditions for a discrete-time decentralised medium access algorithm. Annals of Applied Probability, to appear. Available at https://arxiv.org/abs/1707.01548
• [15] H. L. Smith (1995). Monotone Dynamical Systems: An Introduction to Competitive and Cooperative Systems. Providence, RI: American Mathematical Society, vol. 41, AMS Math. Surveys and Monographs.
• [16] A.L. Stolyar (1995). On the Stability of Multiclass Queueing Networks: A Relaxed Sufficient Condition via Limiting Fluid Processes. Markov Processes and Related Fields, 1(4), 491–512.
• [17] A. L. Stolyar (2008). Dynamic Distributed Scheduling in Random Access Networks. Journal of Applied Probability, 45(2), 297–313.
• [18] L. Tassiulas, A. Ephremides (1992). Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Transactions on Automatic Control, 37(12), 1936–1948.
• [19] N. Walton (2015). Concave switching in single and multihop networks. Queueing Systems, 81, 2, 265–299.