between n0 and h(n0). Moreover, we have ti ≥ ti, for
all i, as it is impossible to successfully transmit i packets
before at least the same amount of packets are gener-
ated. Note that t1, t2,... are not influenced by the order
of packet generations and scheduling decisions, as each
transmission made by n0 is successful with probability
pn0 , regardless which packet is being transmitted.
Given t1, t2,... , n0 can effectively determine which
packets are to be successfully transmitted at times
t1, t2,... , by choosing the order of packet generations
and scheduling decisions. The only restriction for n0 is
that the packet from a flow f cannot be transmitted
before it is generated. If the packet from a flow f is
successfully transmitted by n0 at time t, h(n0) receives
the packet at time t and can transmit the packet starting
at time t + 1. Thus, this system is equivalent to one
with n0 removed, making the size of the network to
be M, and packets from flows f1,f2,... are generated
at sensor h(n0) at times t1 + 1, t2 + 1,.... By the
induction hypothesis on this system with M sensors,
∑f∈F df (k)+E[ef (k + 1)] is maximized if the packet
from flow fi is generated at time ti + 1, for all i. As n0
can make this happen by choosing flow fi to generate a
packet at time ti and follow the Greedy Forwarder, both
Claim (1) and Claim (2) hold when n0 is included in
the system with size M + 1.
By induction on |N|, we have that both claims hold
for all systems, and hence the Greedy Forwarder is
feasibility-optimal.
We close this section by discussing some imple-
mentation issues of the Greedy Forwarder. As noted
above, under the Greedy Forwarder, every sensor makes
scheduling decisions solely based on the packets it
holds. Still, the Greedy Forwarder requires each sensor
to have the knowledge of debts for all flows in the
current interval. In practice, this may be impractical. In
particular, for a large network, sensors that are far away
from the sink can only obtain delayed information on
debts of flows. However, as we will show in Section VII,
when sensors apply the Greedy Forwarder with delayed
information on debts, the resulting performance can still
be optimal. This is because, as the net change of debt,
|df (k + 1) − df (k)|, is bounded, the difference between
the delayed information on debt and the actual current
debt is also bounded for all flows. Therefore, a sensor
that only has delayed information on debts will make
similar scheduling decisions as one that has information
on the current values of debts.
VI. A HEURISTIC FOR HALF-DUPLEX SYSTEMS
In this section, we propose a policy for half-duplex
systems and show that this policy is feasibility-optimal
for some particular scenarios.
Recall that there are two important limitations for
half-duplex systems. First, as a sensor cannot transmit
and receive simultaneously, a sensor n cannot transmit
when its parent, h(n), is also transmitting. Second, a
sensor can only receive one packet at a time, and hence
two sensors n and m with h(n) = h(m) cannot transmit
simultaneously. To address theses challenges, we pro-
pose a policy, namely, the Closest Sensor First Policy. We
first define dn(t) := maxf:cf (t)=n df (k). In other words,
dn(t) is the largest debt of flows that n holds at the tth
time slot. If the sensor n does not hold any packets,
dn(t) is defined to be −∞. The Closest Sensor First
Policy can be described iteratively as follows: First, we
examine all sensors that are one-hop away from the root
r, that is, we examine all sensors such that h(n) = r.
We then schedule the sensor with the largest dn(t) to
transmit, and the sensor transmits the packet from the
flow with the largest debt. Next, we examine sensors
that are two-hop away from the root, that is, sensors
with h(h(n)) = r. If h(n) is scheduled to transmit in the
first step, then n cannot transmit. Otherwise, a sensor
n is scheduled to transmit the packet from the flow
with the largest debt if dn(t) is the largest among all
sensors m with h(m) = h(n). In the above procedure,
ties are broken arbitrarily, and we carry the procedure
iteratively.
In summary, a sensor n who is g-hop away from the
root is scheduled in the gth iteration if: (i) h(n) is
not scheduled in the previous iteration, and (ii) dn(t)
is the largest among all m with h(m) = h(n). Fig. 2
shows an example that illustrates the Closest Sensor
First Policy. In the example, we number sensors by their
respective dn(t). Thus, we have dn(t) = n. In the first
iteration, sensor 5 is scheduled as d5(t) > d3(t). In the
second iteration, sensor 2 is scheduled as d2(t) > d1(t).
Note that sensor 4 cannot be scheduled as its parent,
sensor 5, has already been scheduled. Finally, in the
third iteration, sensor 7 and sensor 9 are scheduled.
Next, we show that the Closest Sensor First Policy
is feasibility-optimal if all flows are generated by the
same sensor n0, i.e., n(f) = n0, for all f, and each flow
generates a packet at the beginning of the interval, i.e.,
τf = 1, for all f. In such a system, only sensors on
the path between n0 and r are involved in forwarding
messages. Thus, we call such a system as a path-topology
system.
Theorem 3: The Closest Sensor First Policy is
feasibility-optimal for path-topology systems.
Proof: By Theorem 1, we can show that the Clos-
est Sensor First Policy is feasibility-optimal for path-
topology systems by establishing that this policy maxi-
mizes ∑f∈F df (k)+E[ef (k+1)] in the (k+1)th interval.
Let γn[v] be the number of transmissions that sensor
n needs to make to successfully transmit v packets to