- Open Access
An incentive-based multicast route construction scheme for recipient maximization in wireless relay networks
© Kuo and Chang; licensee Springer. 2012
- Received: 24 November 2011
- Accepted: 7 June 2012
- Published: 7 June 2012
In this article, we propose an incentive-based resource allocation scheme for wireless relay networks. The aim of this article is to construct efficient multicast routes that serve as many users as possible with a given resource budget. First, we introduce a new resource allocation problem called Multi-Hop Multicast Maximization (MHMM). Then, we present our heuristic Incentive-Based Route Construction (IBRC) scheme, which enables each node to construct an efficient allocation separately and selfishly. We prove that the MHMM problem is NP-complete, and demonstrate that IBRC has polynomial-time complexity. Moreover, under the scheme, each node has an incentive to operate as designed. IBRC's signaling overhead is much lower than that of the conventional centralized approach, and the results of simulations demonstrate that IBRC can motivate relay nodes to provide efficient and stable resource allocations. The results also show that the revenue distribution among nodes is reasonable because it reflects the utility provided by each node. Multicast services deployed under IBRC are efficient and achieve a good performance, but only incur a low overhead.
- wireless relay networks
- resource allocation
Modern wireless access networks, such as IEEE 802.16 and IEEE 802.11, provide broad coverage and achieve high transmission rates. They typically comprise two classes of nodes, namely, a Base Station (BS) and Subscriber Stations (SSs). The BS serves as a gateway to the wired network, while the SSs can be various kinds of mobile or static client devices. Recently, a new type of infrastructure node called a Relay Station (RS) has been discussed in the literature and standards. RSs themselves do not provide wired connections; instead, they wirelessly forward data upward and downward between the BS and SSs to improve the performance and coverage of the wireless network. The IEEE 802.16j standard  includes support for RSs in IEEE 802.16 networks; while a number of articles, such as [2–4], consider IEEE 802.11 multi-hop networks, which allow transit APs to relay packets for mobile users.
As the capacity of mobile devices continues to improve, an increasing number of multicast applications, such as wireless IPTV, Radio over IP, and Video conferencing, are being developed for mobile users. Recently developed technologies, like Wi-Fi and WiMAX, are excellent platforms that enable service carriers to provide multicast services wirelessly due to the platforms' high capacity, wide coverage range and the broadcast nature of the wireless medium. To adapt wireless transmissions to different channel conditions, most wireless technologies use adaptive modulation and coding (AMC) , which adapts modulation and coding methods dynamically based on the channel quality. When the channel quality is good, a faster coding scheme can be chosen; and when it is poor, a slower but more robust one should be used. Since the channel quality of wireless nodes varies, the appropriate coding scheme and the corresponding rate may be different for each node. Moreover, as the wireless resource is naturally scarce, the amount used by each multicast service should be limited in order to maintain the stability and fairness of the network. Clearly, it is impossible to provide all the services requested by users. Given the limited budget of a multicast stream, the system should service as many requests as possible so that the overall satisfaction of users can be maximized.
The selfish behavior of RSs and the heavy signaling overhead incurred by information exchange make the problem even more challenging. In a wireless wide-area network, different organizations, such as companies, schools, restaurants, small business offices, individual residences, and hot spots, may set up proprietary RSs to improve the access quality for mobile device users. Local carriers may also want to set up RSs to implement forwarding services for better network coverage and access quality. Network carriers encourage the use of proprietary RSs because mobile users associated with such RSs can enjoy better channel quality. The performance of the SSs is not affected, since they can still access the network via the original relays. However, proprietary RSs usually belong to independent profit-oriented entities, so they are indeed selfish. In other words, they want to maximize their income and will only forward/relay packets for other nodes when the profit they make exceeds the cost of relaying. As the selfish behavior of RSs may result in low utility of the allocated resource, they should be encouraged to cooperate with other senders so that the performance of the whole network (i.e., the total number of multicast recipients) can be further improved. The signaling overhead compounds the multicast problem. To obtain a complete picture of the network, a centralized allocation scheme must monitor all the channel conditions between each sender-receiver pair, which results in a high signaling overhead for information exchange when the network scope is large. If a multicast resource allocation scheme could be implemented in a more distributed manner, where each independent node decides an operation without exchanging the channel information, the signaling overhead would be reduced substantially and the scalability of multicast services would be improved.
The above challenges call for a dedicated incentive-based low-overhead allocation scheme for multicast services over wireless relay networks. To this end, we define a maximization problem called Multi-Hop Multicast Maximization (MHMM) in wireless relay networks, where the RSs can act as relays for other RSs. Given the budget of a multicast service and the channel quality of all nodes, MHMM tries to maximize the number of recipients. We prove that MHMM is NP-complete. Since no existing work can resolve this problem effectively, we focus on wireless relay networks in which the BS and RSs are selfish, and propose a mechanism called Incentive-Based Route Construction (IBRC). In the proposed scheme, each sender decides the amount of the resource it requires and the service condition independently based on its own information and incentive. Therefore, the conflicting interests that arise when forming a purely centralized system can be avoided, and each sender's channel information does not have to be reported to a conventional centralized allocation scheme. Through analysis, we show that each agent (i.e., BS, RS, and SS) in the proposed mechanism will operate as designed because its income can be maximized. We also demonstrate the efficacy of IBRC via simulations. The results show that the scheme achieves a good performance and implements a stable allocation strategy.
Because all nodes operate independently and the amount of information exchanged between nodes is reduced, IBRC has a low signaling overhead and good scalability. Moreover, since IBRC is modeled in a very general way, it can be implemented indifferent kinds of wireless relay networks as long as AMC is supported. The mechanism can also handle unicast traffic by treating each flow as a multicast service that has only one recipient. Meanwhile, the low computational complexity and signaling overhead of IBRC mean that it can be executed in real-time or periodically to reflect time-varying channel conditions. Although IBRC considers the allocation of each session separately, given the budget of each stream, the scheme can construct the resource allocation strategies of several multicast services in a system. To the best of authors' knowledge, this is the first study that solves the multicast problem and yields all of the above advantages.
The remainder of the article is organized as follows. Section 2 contains a review of related studies. In Section 3, we model the system and analyze the difficulty of the problem. In Section 4, we introduce the proposed scheme, study the best strategy for each agent, and consider the scheme's complexity and performance. The simulation results are reported and discussed in Section 5. We then summarize our conclusions in Section 6.
In this section, we review some related studies on multicast in wireless relay networks, the selfish behavior of some agents, and the incentive mechanisms used to motivate those agents to cooperate with other nodes.
2.1. Multicast schemes
A great deal of research has been conducted on multicast issues in wireless networks. For example, Lee and Cho  designed a reliable multicast scheme using Code Division Multiple Access (CDMA) codes in WiMAX networks; She et al.  proposed a two-level superposition coded multicast scheme (2-level SCM) to improve the channel efficiency of multicast transmissions in a WiMAX network; and Zhao et al.  studied the power allocation issue to achieve robust multicast communication in CDMA-based wireless networks. In addition to multicast schemes for wireless networks, a class of allocation problems called Minimum-Energy Multicast (MEM) has been well studied in a number of studies, such as [9–12]. Given the channel condition of each node, the MEM problem finds the multicast tree that minimizes the total energy required to deliver a stream to a given set of subscribers. Although MEM appears to be similar to our maximization problem (i.e., MHMM), the approaches are substantially different. First, most studies of MEM assume that each intermediate node can forward data; however, only RSs can relay data in MHMM relay networks. Second, MEM minimizes the resource required to serve subscribers, whereas MHMM maximizes the number of recipients that can be served with a limited budget. Third, under MEM, it is assumed that each node receives a separate copy of the data from the sender, but MHMM allows SSs to receive data as long as the channel quality permits. Therefore, if the resource for a multicast program is limited due to the network's resource management policy, MHMM should be adopted to solve the problem instead of MEM.
2.2. Selfish behavior of nodes
The problem caused by nodes' selfish behavior has long been recognized by the mobile ad hoc network community, and several mechanisms that encourage cooperation have been proposed . Existing approaches may be reputation-based (e.g., [14–19]), where the behavior of each node is monitored and non-cooperative nodes (including selfish and malicious ones) are penalized; or they may be payment-based (e.g., [19–22]), where some virtual currency is introduced to encourage packet forwarding to other nodes. Other issues addressed in existing works include preventing cheating [20, 21] and collusion . However, the above approaches only encourage selfish agents to participate in routing or forwarding operations. They do not consider multicast transmission, so they are not suitable for the MHMM problem.
To date, very few studies have tried to solve the multicast recipient maximization problem in wireless relay networks containing selfish nodes. In , the authors propose a truthful multicast routing scheme for selfish wireless networks. By reporting the cost of each link, each node decides independently the route that will maximize its benefit. Since this study tries to solve the MEM problem, it differs from our approach. Wei and Gilin presented a cooperative relay scheme for a WWAN/WLAN two-hop relay network. A selfish dual-mode terminal can be encouraged to relay data by payment from other nodes. However, under this scheme, each node, including each mobile user, can work as a relay node, and the scale of the network is limited to only two hops. Most importantly, none of the above studies consider AMC. Therefore, they let each sender transmit a stream separately to each receiver instead of multicasting it only once. In contrast, under our model, a transmitted stream can be received simultaneously by several subscribers as long as the channel conditions allow. Lee et al.  proposed an incentive-based transmission framework to maintain fairness in multi-hop wireless backhaul networks with selfish Transit Access Points. It is not suitable for our multicast scenario because the mechanism is designed for maintaining fairness between unicast traffic.
In this section, we describe the system and business models for wireless relay networks. We also formally define the multicast recipient maximization problem and prove that it is NP-complete.
3.1. System models
Wireless relay networks utilize different types of wireless resources. Our scheme can be applied in a variety of wireless relay networks because it is modeled in a general way. Without loss of generality, the resource in our model refers to the amount of the transmission medium that can be distributed and utilized by different nodes. Therefore, depending on the physical design of the wireless network, the resource can be the number of timeslots, subchannels, or transmission codes. For example, the resource of a WiMAX network refers to the number of timeslots in a downlink subframe; while in a Wi-Fi network, it may be the amount of transmission time in the contention-free period. The budget of a multicast program means the maximal usable resource of the service, which may be predetermined by the system or left by other high-priority traffic. A fixed budget is given to each multicast service for distribution between the BS and the RSs. We denote this stream budget by rbudget.
In this article, we consider general wireless relay networks in which an RS can act as a relay for other RSs. The SSs can receive a multicast stream from the BS directly, or from one of the RSs via one-hop or multi-hop relays. Let the number of RSs and the number of SSs be M and N, respectively. Each node is labeled with a unique integer for identification purposes. In addition, let node 0 be the BS, nodes 1 to M be the RSs, and nodes M + 1 to node M + N be the SSs. Since the proposed scheme supports AMC, we assume that the minimum resource required to transmit a stream successfully is different for each node. Given the data rate of the stream and that of the coding method, we can determine the amount of the resource consumed when transmitting the stream with the coding method. Let r i,j denote the resource required to transmit a multicast stream from node i to j. In an AMC-supported network, where the channel conditions between the nodes are monitored and the coding method is adjusted accordingly, specifying r i,j between each pair of nodes allows different transmission capacities, channel models, and attenuation conditions to be tolerated. If a stream is transmitted by i with resource r, all nodes j that have r i,j ≤ r can decode the stream successfully because the coding method utilized by the nodes' channels is not slower than that used by i. Taking the WiMAX network as an example, based on the channel quality, each channel has a different Burst Profile, which records its acceptable modulation schemes and therefore the transmission speed. If a multicast stream is encoded by a certain coding method (i.e., it takes a certain number of timeslots), all receivers whose channels allow a faster scheme (i.e., they require fewer timeslots) will be able to decode the stream successfully.
Next, let be the resource allocation of the senders (i.e., the BS and the RSs), where r m is the resource allocated to the m th sender for the multicast service 0 ≤ m ≤ M. Without loss of generality, we allow the RSs to be placed in the order of the required resource, i.e., r0,1 ≤ r0,2 ≤ ... ≤ r0,M. If a sender, say sender m, is allocated the resource r m , each SS and RS whose resource requirement is less than r m can receive the data simultaneously from m. To describe the reach ability of senders, the binary function , 0 ≤ m ≤ M, indicates whether m can receive the stream originating from the BS when the allocation is given. Since we consider general wireless relay networks in which an RS can act as a relay for other RSs, the value of is 1 if there exists an RS m' that satisfies the following conditions: (i) node m is within the transmission range of m'; (ii) (i.e., node m' can receive the stream from the BS); and (iii) r m',m ≤ r m' (i.e., m can receive the stream from m'), where 0 ≤ m' ≤ M.
Given an allocation and the channel conditions of the network (i.e., r i,j for all i and j,) the value of for all senders (i.e., all nodes m ≤ M) can be derived easily as follows. Initially, the value of for all m > 0 is set at 0, while because the BS can always receive the stream irrespective of the value of . Then, all unserved RSs (i.e., ) in the transmission range of the BS that can receive the stream from the BS (i.e., all m where r0,m≤ r0) set their value to 1. Next, all unserved RSs that can receive the stream from served senders (all m that can find a 0 ≤ m' ≤ M that satisfies and ) are included. This process is repeated until no more RSs can be included. Given an allocation , it takes O (M2) steps to compute for all m because at most m senders have to be checked in each round. The process is repeated at most M rounds, since one sender is included in each round. We introduce another unit-step function U(·) to determine whether an SS can receive the stream from either the BS or one of the RSs. The value of U(x) is 1 if x ≥ x; otherwise, U(x) = 0. Then, shows if the SS n can receive the stream from node m.
3.2. Problem specification
With the above notations, we formally define our MHMM problem as follows.
Definition 3.1 MHMM involves finding that maximizes with a given budget rbudget and r i,j , 0 ≤i, j ≤ M + N, subject to and r m ≥ o for all 0 ≤ m ≤ M.
Since shows if an SS n can receive a stream from the m th RS, the value of is 1 if there exists at least one route from node 0 to node n that allows the n th SS to receive the stream: otherwise, the value is 0. Therefore, the objective function refers to the number of SSs that can receive the multicast stream given the allocation .
The following theorem proves that MHMM is NP-complete.
Theorem 3.1 MHMM is NP-complete.
To prove that MHMM is NP-complete, we consider another problem called Single-Hop Multicast Maximization (SHMM). Similar to MHMM, SHMM tries to maximize the number of recipients with a given resource budget. The only difference is that SHMM is limited to one-hop relay, i.e., RSs can only relay data between the BS and the SSs; they cannot forward data for other RSs.
Next, we verify that SHMM is a special case of MHMM. If we let the required resource between each pair of RSs be larger than the limited budget (i.e., for all 0 < m1, m2 ≤ M) in SHMM, the RSs cannot relay data for each other. Consequently, any instance of SHMM is an instance of MHMM. Therefore, MHMMis more general than SHMM, so it is also NP-hard.
On the other hand, MHMM is also NP. Given a resource allocation , the number of recipients the system can serve is . The complexity of the whole computation process is O(M3N) because, as mentioned in Section3.1, the complexity of finding for all m is O(M2), and it takes O(MN) steps to sum for all m and n. As the performance of a solution can be verified in polynomial time, MHMM is NP; and because MHMM is both NP-hard and NP, it is also NP-complete.
From the above proof, we know that even when transmissions are only possible from the BS to RSs, the maximization problem is already NP-hard. However, in a real-world scenario, where RSs are within each other's transmission range, the problem becomes much more difficult because there are more possible allocation options. To address this problem, we propose a low-overhead incentive-based resource allocation scheme that solves the MHMM problem efficiently and effectively in wireless relay networks with selfish nodes.
In this section, we discuss the proposed mechanism, called IBRC for MHMM, and show that it achieves good resource utilization. We analyze the mechanism's truthfulness and computational complexity, and compare the signaling overhead with that of the traditional centralized approach.
4.1. Business model and proposed scheme
As shown in Figure 5, each sender only participates if the allocation will be profitable. In other words, the revenue each sender receives from the SSs (i.e., Pstream N, where N is the number of SSs the sender serves,) must be greater than the price it pays the BB for the resource. Therefore, the preferred amount of resource it submits to the BB is proportional to the lower bound of the number of served users. For the BB, given the preferred resource of sender m under the unit price p i , it can derive revenue of and serve at least senders. Therefore, under p i , the total revenue that the BB can derivefrom all senders is , and it can serve at least SSs. Therefore, when the BB tries to maximize its revenue (i.e., ), it also maximizes the lower bound of the served SSs (i.e., ). In other words, the BB sets the price to maximize the efficiency of global resource allocation among senders. Meanwhile, each sender attempts to maximize its profit by serving as many users as possible with the given resource.
Clearly, IBRC can utilize RSs to make resource allocation more efficient. As mentioned earlier, the BB queries each sender for its preferred resource under each price. Since the BS is always the first sender to be queried, it is always offered the same array served_SS = [0, 0, ..., 0], irrespective of the number of RSs in the network. Given the same served_SS and identical channel conditions r0,M+1, r0,M+2, ..., r0,M+N, the BS always requests the same amount of the resource and serves the same number of SSs regardless of the number of RSs. Therefore, if there are RSs in the network, the SSs that were originally served by BS will always be served; while unserved SSs can be served by the RSs. This means that the performance of the RSs is always at least as good as that of the pure-BS approach.
4.2. Best strategies for each agent
As mentioned in Section 1, each agent is selfish, so its objective is to maximize its income. Therefore, we have to prove that the operation of IBRC can yield the maximum revenue so that each sender can operate as proposed under IBRC. In the analysis, we assume that each role in the system makes decisions in dependently, and no collusion occurs. In IBRC, the BB's strategy is to set the price index i set as , as shown in the last two lines of Figure 4. The process implemented by each sender (i.e., function query) is detailed in Figure 5. The sender m sets the preferred resource as , and returns arrays served_SS_new and D new to indicate the changes to served_SS and D if it is allocated resource . In Theorems 4.1 and 4.2, we prove that these functions yield the maximum profit; thus, they are the most effective strategies for the BB and the RSs, respectively.
Theorem 4.1 Setting i set as yields the highest expected revenue for the BB.
If the radio resource is sold at unit price pi, the BB's profit is the price p i multiplied by the total amount of the resource consumed under p i . Since the allocation under p i is , the total resource consumed is . To maximize its profit, the BB must choose the price p i that maximizes the value of . Therefore, the best price for the BB (i.e., i set ) would be .
Theorem 4.2 The pseudo-code in Figure 5(i.e., acting truthfully) yields the highest expected revenue for each sender.
In IBRC, the BB queries each sender for its preferred resource requirement under all prices (i.e., query(m, pstream, p i , served_SS, D)). To determine the amount of the resource that would maximize its profit, each sender m bases its decision on the array served_SS and the local information about the channel quality (i.e., r m,n for all n). Since senders do not exchange information, they are not aware of each other's preferred resource (i.e., for all m) or channel quality (i.e., r m',n for all m' and n). Moreover, under the rules of the proposed schemes, senders are not given any information about the resource budget rbudget, which is only stored in the BB. Senders are also queried in different orders for different prices, as mentioned earlier. Therefore, it is impossible for a sender to predict the decisions of other senders and the BB, let alone alter the result. Consequently, the probability that the resource price is p i can be viewed as an unknown value 0≤ p i ≤ 1, where . Given that R m,i (r) denotes the revenue of each sender m if it buys resources r under price p i , the total expected value of the revenue is . Therefore, irrespective of the value of p i , the most effective strategy is to maximize R m,i (r) for all i because other decisions would not yield revenues larger than .
Next, we consider finding under a given price p i . When the resource claimed by m is 0, its profit is 0. It pays nothing and earns nothing because the sender does not receive the stream from other senders, so it does not serve any nodes. If r (i.e., the allocated resource) ≥ 0, then , where rp i is the total price the sender has to pay the BB; while is the income m receives from the SSs it serves. Therefore, under this dominant strategy, for all prices p i , m's preferred amount of resource (i.e., the best strategy to use when requesting the resource)would be , as shown in the second line of Figure 5.
4.3. Computational complexity
Theorem 4.3 The computational complexity of IBRC is polynomial.
As shown in Figure 4, the main function of IBRC comprises two for loops and one do loop. The complexity of the first for loop is O(1) because I max is a constant; while the complexity of the do loop is O(M) because it queries at least one sender in each round and thus executes M times at most. The complexity of the second for loop is also O(M) because the value of m ranges from 0 to M. Finally, the complexity of the pricing decision (i.e., i set ← ) is O(M) because, for each price, the BB has to sum the resource requirements of all the senders. The function query has to consider n = 0 to N, and the subsequent two for loops execute N and M times, respectively. Therefore, its overall complexity is O(N + N + M) ≅ O(N) because, in a relay network. The number of SSs should be much larger than the number of RSs. Combining all the loops and sub-functions based on the loop structure, the overall complexity of IBRC is O(M M N + M) = O(M2N), which is in polynomial time.
Note that although the worst-case complexity of IBRC is O(M2N), the actual overhead during computation is much lower and approximates O(MN). This is because, in each round of the first for loop in the main function, the algorithm picks one available sender to query. In a round where the sender m does not satisfy the conditions (i.e., D m == 1 and asked_RS[m] == 0), only one simple judgment is made, so its complexity can be ignored. After the algorithm queries the selected sender, it exits the for loop and starts the next round of the do loop. Therefore, the combined complexity of the first for loop and the do loop approximates O(M), so the complexity of IBRC also approximates O(MN).
4.4. Truthfulness analysis
Under IBRC, the system must ensure that the transactions about the resource between the senders and the BB, as well as the transactions about the multicast stream between the senders and SSs, are undeniable and cannot be forged. This can be achieved by providing some group signature/cypher technologies, by making a contractual agreement in advance, or by using a third-party to monitor the transactions. For example, an SS has to pay the sender pstream for the key to decode the multicast stream. If the sender not serve the SS after receiving pstream, it will be reported and penalized. Similarly, since all senders inform the BB about their preferred resource at a certain price (i.e., ), the system has complete information about the senders' resource requirements under all prices. Hence, the system can penalize a sender if it does not pay for the allocated resource, or if the BB receives the payment and does not allocate the resource. On the other hand, the reply to query is based on each sender's incentive. In the first for loop in Figure 5, the sender m marks all the SSs that it serves (i.e., ) by letting served_SS_new[n] = 1, and leaves the remaining SSs unchanged (i.e., served_SS_new[n] = served_SS [n]). Similarly, it updates array D by marking all RSs that it serves as 1 in the second for loop. The array served_SS_new and D new returned by m can only influence other senders that have not been queried. Since the BB queries those senders after allocating the resource to m, if m updates served_SS_new or D new incorrectly, the altered behavior of senders queried afterwards cannot benefit m, or the SSs that m serves. Recall that senders are queried in a different order for each price so they cannot prevent each other from being served by providing false served_SS_new and D new information. In other words, senders do not have any incentive to give false information; thus, the design of IBRC encourages honesty.
4.5. Signaling overhead
If a centralized approach is used to solve MHMM, the information about the channel quality between all nodes must be concentrated in one place (typically the BS) so that the algorithm can gain a complete picture of the network and calculate the outcome. Consequently, the channel quality of M + N nodes must be transmitted separately over the wireless medium. For M + N nodes, the number of channel conditions between each pair of nodes (i.e., r i,j for all r i,j , 1 ≤ i, j ≤ M + N and i ≠ j,) is O((M + N)2. Under a traditional centralized allocation scheme, the RSs would have to report all of this information before a central node could allocate the resource. In contrast, the signaling overhead of IBRC is O(M(M + N)) because, for i = 1 to Imax, the algorithm only queries each sender once (i.e., by calling the function query). For each query, the sender returns the arrays served_SS_new and D m_new , whose sizes are O(N) and O(M), respectively. Since Imax is a constant, the total signaling overhead of the function query is O(M(M + N). When the number of SSs (i.e., the value of N) is large, the difference between the signaling overhead of a centralized scheme and that of IBRC can be substantial.
In this section, we evaluate the performance of IBRC via simulations and demonstrate that it achieves good performance.
5.1. Simulation settings
To set the price, we let the cost of serving one SS, (i.e., pstream), be normalized to 1. Hence, we let the maximal unit price be the ratio between the total number of SSs and the resource required to serve the most distant SS, (i.e., ). The rationale is that no SS will be ignored by all senders because the BS can at least consider serving all SSs if the maximal unit price is given. Next, we divide the price into K parts and let P = [Δp, 2Δp, ..., K Δp], where . In some pilot simulations, we found that the granularity of Δp (i.e., the value of K) did not affect the performance of IBRC significantly, as long as K was not too small, (e.g., K < 10). Since a larger K may increase the computation time of the simulations, we let K = 20 in this study.
Based on the above settings, we conducted three simulations. The first assessed the performance of IBRC using different numbers of RSs and different resource budgets. In the second simulation, we observed the stability of the proposed algorithm; and in the third, we investigated the distribution of the benefits between the BB and RSs under different conditions.
5.2. Simulation I
The simulation results in Figure 7a show that, given the same resource budget, IBRC's performance (i.e., the number of SSs served) improves as M increases. This is because, under IBRC, the larger the number of RSs, the greater the possibility that they can utilize the resource to increase their profit, which makes the allocation more efficient. On the other hand, the simple shortest-path approach shows no obvious performance improvement compared to the pure-BS approach Moreover, as M increases and the senders of SSs become more diverse, the performance degrades further. This is because minimizing the resource required by each SS independently is not necessarily an efficient allocation strategy. If the multicast routes of all SS sare not considered together, the relaying operations of RSs do not always improve the performance.
Next we assess the maximal performance difference between IBRCand the upper bound of the optimum. Given that represents the minimal resources required for each RSm to receive the stream from the BS (i.e., the resources required by the shortest path from the BS to RSm), the maximal possible resources each RS m acquires under budget rbudget can not be larger than . It follows that the performance of the optimal solution is upper-bounded by . Therefore, IBRC's performance ratio to the optimum is never less than the ratio to this bound. In Figure 7b, which shows the ratio of IBRC, we observe two phenomena. First, IBRC is more efficient (i.e., the ratio approximates 100%) when the available resource is close to 0 or 100%. This is because, when the budget approximates the scarce or sufficient extreme, the number of possible allocations is limited. Second, under different numbers of RSs and resource budgets, the ratio is larger than 70% most of the time, and the lowest performance ratio is always larger than 60%. This trend evidences the efficiency of IBRC. Since we use the upper bound instead of the actual optimum solution, the actual ratio may be even higher.
5.3. Simulation II
To assess the stability of IBRC's allocation strategy, we define a category called sacrificed SSs, which are SSs served before a new SS joins and requests the stream, but they become unserved afterwards. This phenomenon occurs because an incoming SS may cause senders to make different service decisions and thus change the network topology. If a new user can interrupt the services provided to a large number of users, the proposed IBRC scheme would be impractical because the subscribed service would be unstable. Therefore, the number of sacrificed SSs should be kept to a minimum. Similar to Simulation I, we set a = 3, N = 100, and tune rbudget from 0 to 1003. After the allocation has been computed, a new SS is placed at random in the circle area. A new allocation is then generated and compared with the old one to calculate the number of sacrificed SSs. Again, the results of each setting are averaged over 100 random runs.
5.4. Simulation III
Finally, we investigate the profit distribution between the BB and the senders. The BB's profit (i.e., γBB) is the decided price multiplied by the total amount of the resource consumed at that price (i.e., ). Hence, the BB's share of the profit (i.e., the ratio between γBB and the total profit from served mobile users) is ; and the average share of the senders (including the BS and the RSs) is , where Nserved is the number of served SSs.
In this article, we have investigated the multicast resource allocation problem in wireless relay networks. To the best of authors' knowledge, this issue has not been studied previously. We formulate the problem as MHMM and propose an economics-based algorithm called IBRC to resolve it. In the proposed scheme, each agent, including the BS, RS, and the BB, decides its best strategy based on the local information and its own incentive, so it can operate selfishly and independently. We show that, under IBRC, each agent has an incentive to operate honestly because it is the best way to obtain the maximum profit. Through analysis, we prove that MHMM is NP-complete, while IBRC has polynomial-time complexity. In addition, we show that IBRC's signaling overhead is significantly lower than that of the traditional centralized allocation scheme because the amount of information exchanged is reduced substantially. The simulations also demonstrate that IBRC allocates resources and utilizes RSs efficiently.
We also validate IBRC's performance through simulations. The results show that the larger the number RSs, the better will be the performance, which means that the scheme can utilize RSs to improve the allocation of bandwidth. Furthermore, we evaluate IBRC's operating stability and revenue distribution. In different scenarios, the allocation strategy is very stable, so existing users are rarely affected by a new user's request for bandwidth. Meanwhile, the revenue distribution between the senders (i.e., the BS and RSs) and the BB appears to be reasonable under different conditions, since each agent receives a fair and acceptable percentage of the profit based on the utility it provides. Our analysis and simulations show that IBRC is an efficient scheme that achieves a good performance, but only incurs a low signaling overhead. Thus, it can be adapted to different kinds of wireless relay networks in the real world. In the future, based on the findings reported in this study, we will consider the impact of users' mobility, as well as the Qo S requirements of different traffic types (e.g., elastic and inelastic ones).
- 802.16j Baseline Document: "Baseline Document for Draft Standard for Local and Metropolitan Area Networks,". IEEE 802.16j-06/026r2 2007.Google Scholar
- Robinson J, Knightly E: A performance study of deployment factors in wireless mesh networks. In Proceedings of IEEE INFOCOM 2007. Anchorage, Alaska, USA; 2007:2054-2062.Google Scholar
- Camp J, Robinson J, Steger C, Knightly E: Measurement driven deployment of a two-tier urban mesh access network. In Proceedings of ACM MOBISYS 2006. Uppsala, Sweden; 2006:96-109.View ArticleGoogle Scholar
- Gambiroza V, Sadeghi B, Knightly EW: End-to-end performance and fairness in multihop wireless backhaul networks. In Proceedings of ACM MOBICOM 2004. Philadelphia PA; 2004:287-301.Google Scholar
- Goldsmith AJ, Chua S-G: Adaptive coded modulation for fading channels. IEEE Trans Commun 1998, 46(5):595-602. 10.1109/26.668727View ArticleGoogle Scholar
- Lee H, Cho D-H: Reliable multicast services using CDMA codes in IEEE 802.16 OFDMA system. In Proceedings of IEEE Vehicular Technology Conference 2005. Dallas, USA; 2005:2349-2353.Google Scholar
- She J, Hou F, Ho P, Xie L: IPTV over WiMAX: key success factors, challenges, and solutions. IEEE Commun Mag 2007, 87-93.Google Scholar
- Zhao S, Xiong Z, Wang X: Optimal resource allocation for wireless video over CDMA networks. IEEE Trans Mob Comput 2005, 4(1):56-67.View ArticleGoogle Scholar
- Wieselthier JE, Nguyen GD, et al.: On the construction of energy-efficient broadcast and multicast trees in wireless networks. In Proceedings of IEEE INFOCOM 2000. Tel-Aviv, Israel; 2000:585-594.Google Scholar
- Egecioglu O, Gonzalez T: Minimum-energy broadcast in simple graphs with limited node power. In Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2001). Anaheim, CA; 2001:334-338.Google Scholar
- Li D, Jia X, Liu H: Energy efficient broadcast routing in static ad hoc wireless networks. IEEE Trans Mob Comput 2004, 3(2):144-151. 10.1109/TMC.2004.10View ArticleGoogle Scholar
- Guo S, Yang O: A dynamic multicast tree reconstruction algorithm for minimum-energy multicasting in wireless ad hoc networks. In Proceedings of IEEE International Conference on Performance, Computing, and Communications, 2004. Phoenix Arizona; 2004:634-642.Google Scholar
- Buchegger S, Le Boudec J: Cooperative routing in mobile ad-hoc networks: current efforts against malice and selfishness. In Proc of Lecture Notes on Informatics, Mobile Internet Workshop, 2002. Dortmund, Germany; 2002.Google Scholar
- Buchegger S, Le Boudec JY: Performance analysis of the CONFIDANT protocol: cooperation of nodes-fairness in dynamic ad-hoc networks. In Proc of ACM Mobi Hoc. Tokyo, Japan; 2002:226-236.Google Scholar
- Michiardi P, Molva R: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc of IFIP CMS 2002. Portoroz, Slovenia; 2002:107-121.Google Scholar
- Resnick P, Kuwabara K, Zeckhauser R, Friedman E: Reputation systems. Commun ACM 2000, 43(12):45-48. 10.1145/355112.355122View ArticleGoogle Scholar
- Marti S, Giuli T, Lai K, Baker M: Mitigating routing misbehavior in mobile ad hoc networks. In Proc of ACM MobiCom, 2000. Boston, MA; 2000:255-265.Google Scholar
- Buchegger S, Boudec J-YL: Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In Proc of Euromicro PDP, 2002. Canary Islands, Spain; 2002:403-410.Google Scholar
- Zhong S, Yang Y, Chen J: Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In Proc. of IEEE Infocom, 2003. San Francisco, California; 2003:1987-1997.Google Scholar
- Buttyan L, Hubaux J: Enforcing service availability in mobile adhoc WANs. In Proc of ACM MobiHoc, 2000. Boston MA; 2000:87-96.Google Scholar
- Jakobsson M, Hubaux J, Buttyan L: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proc of Financial Crypto, 2003. Gosier Guadeloupe; 2003:15-33.Google Scholar
- Anderegg L, Eidenbenz S: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proc of ACM Mobicom, 2003. San Diego, CA; 2003:245-259.Google Scholar
- Wang W, Li X-Y, Wang Y: Truthful multicast routing in selfish wireless networks". In Proceedings of MOBICOM. Philadelphia, PA, USA; 2004:245-259.Google Scholar
- Wei H-Y, Gilin RD: Incentive scheduling for cooperative relay in WWAN/WLAN two-hop-relay network. In Proceedings of WCNC 2005. New Orleans, LA USA; 2005.Google Scholar
- Lee J-F, Liao W, Chen MC: An incentive-based fairness mechanism for multi-hop wireless backhaul networks with selfish nodes. IEEE Trans Wirel Commun 2008, 7(2):697-704.View ArticleGoogle Scholar
- Hochbaum D: Approximating covering and packing problems: Set cover, vertex cover, independent set, and related problems. In "Approximation Algorithms for NP-hard Problems". Edited by: Hochbaum, D. PWS-Kent, Boston; 1997:94-143.Google Scholar
- An Architecture for differentiated services IETF RFC 2475Google Scholar
- Rappaport TS: Wireless Communications: Principles and Practices. Prentice-Hall, Englewood Cliffs, NJ; 1996.Google Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.