• 沒有找到結果。

Noncooperative admission control for differentiated services in IEEE 802.11 WLANs

N/A
N/A
Protected

Academic year: 2021

Share "Noncooperative admission control for differentiated services in IEEE 802.11 WLANs"

Copied!
6
0
0

加載中.... (立即查看全文)

全文

(1)

Noncooperative Admission Control for

Differentiated Services in IEEE 802.11 WLANs

Yu-Liang Kuo

, Eric Hsiao-Kuang Wu

, and Gen-Huey Chen

Dept. of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, R.O.C. Dept. of Computer Science and Information Engineering, National Central University, Chung-Li, Taiwan, R.O.C.

Abstract— Recent developments in wireless LAN (WLAN)

standardizations have been successful to offer high-speed data services. Hence, a variety of types of traffic must be accom-modated in future WLAN environments. IEEE 802.11 working group has been developing a new distributed MAC, called enhanced distributed function (EDCF), to support service dif-ferentiation in the IEEE 802.11 MAC protocol. Besides, high-speed WLAN environments are also expected to provide wireless Internet services in hot spots such as airports, parks, and etc. Since there are usually multiple service providers competing for providing wireless network access in hot spots, mobile users are free to choose their own service providers. For a specific service provider, more flows are admitted to transmit in its coverage range, more revenue (e.g., utility or profit) is gained. However, admitting many flows may make the wireless medium overloaded and degrade the QoS satisfactions of ongoing flows since the wireless medium in IEEE 802.11 is share and collision-based. Hence some mobile users may leave the current service provider and subscribe to wireless network access with another service provider. In this paper, we analyze the resource management problem in the competitive environment, in which EDCF protocol is implemented in all access points (APs) and mobile stations. We formulate admission control as a game and prove the game owns a Nash equilibrium solution. Based on the game, a service provider not only fulfills most part QoS satisfactions of ongoing flows but also increases its own revenue. We evaluate the performance by means of throughput, packet delay and bandwidth violation ratio.

I. INTRODUCTION

With the provisioning of high-speed WLAN environments, data services (e.g., VoIP or video-conference) with different QoS requirements will be available in future WLANs. Hence, data services will be categorized into multiple traffic classes and different priorities are used to access the wireless medium. However, in the current access mechanism of IEEE 802.11, all mobile stations have the same priority to access the wireless medium. In order to satisfy multiple traffic classes with different QoS requirements, it is desired to provide service differentiation in the IEEE 802.11 standard [5].

Providing service differentiation requires a MAC protocol to support different access priorities among different traffic classes. Recently, the IEEE 802.11 working group has been developing a new distributed protocol, called EDCF, to support service differentiation in the MAC layer [3]. EDCF is an extension of the existing distributed coordination function (DCF) to support service differentiation. More details about DCF and EDCF will be presented in Section II.

Apart from the MAC service differentiation, high-speed

WLAN environments are also expected to provide public wire-less Internet services in ”hot spots” such as airports, parks and etc., where a high density of mobile users will create demand for wireless network access [10]. Hence multiple wireless service providers dispose their infrastructures, e.g., APs, in hot spots to provide wireless network access. Mobile users that in-tend to access wireless Internet services are charged by prepaid cards, online purchasing, or other charging mechanisms. Since there are usually multiple service providers in a local region, mobile users are free to choose their own service providers. Admitting more flows to transmit in the coverage range of an AP (belonging to a certain service provider) will gain more revenue for the service provider. However, admitting many flows may make the wireless medium overloaded and degrade the QoS satisfactions of ongoing flows since the wireless medium in IEEE 802.11 is share and collision-based. Hence some mobile users may leave the current service provider and subscribe to wireless network access with another service provider.

In this paper, we analyze the resource management prob-lem in the competitive environments, in which EDCF is implemented in access points (APs) and mobile stations. We formulate admission control as a game, which is nonzero-sum and noncooperative. Based on the game, a service provider not only fulfills most part of QoS satisfactions of ongoing flows in its radio coverage but also increases its own revenue.

The rest of this paper is organized as follows. Section II reviews the DCF and EDCF protocols. Section III suggests an admission control game formulation under which it owns a Nash equilibrium solution. Section IV shows the performance evaluation for the admission control. Section V concludes this paper.

II. DCFANDEDCF

DCF operates based on carrier sense multiple access with collision avoidance (CSMA/CA). A mobile station that intends to transmit a packet first senses the channel. If the channel is idle for a time period of DCF interframe space (DIFS), it can immediately start transmission. Otherwise, it generates a backoff counter. The counter starts decrement if the channel is sensed idle for a time period of DIFS. Then the counter continues to decrease until the channel is busy or the counter counts down to zero. If the channel is busy, the decrement will pause and resume after another idle time period of DIFS. When the counter counts down to zero, the mobile

(2)

TABLE I

FOURACS SPECIFIED IN THEIEEE 802.11E

AC0 AC1 AC2 AC3

Values of AIFSN 2 1 1 1

Values of CWmin 32 32 16 8

Values of CWmax 1024 1024 32 16

station starts transmission. In order to avoid channel capture, a mobile station has to wait a random backoff time between two consecutive packet transmissions, even if the channel is idle for a time period of DIFS.

The backoff counter is randomly assigned a value from the range [0, CW−1], where CW is the contention window. Ini-tially, let CW=CWmin, the minimum contention window. When

the transmission (or retransmission) fails, the value of CW is doubled until it reaches the maximum CWmax=2mCWmin,

where m is called maximum backoff stage.

DCF employs two access mechanisms for packet trans-mission. One is two-way handshaking and the other is four-way handshaking. For the former, an ACK (acknowledgement) message is used to indicate that the transmitted packet has been correctly received by the destination station. For the later, an RTS (request-to-send) message is first sent by the source station. When the destination station receives the RTS, it replies a CTS (clear-to-send) message. After receiving the CTS message, the source station is allowed to transmit a packet. Finally, the destination station informs the source station of a successful transmission by replying an ACK message.

RTS and CTS messages carry information about the identi-fiers of the source and destination stations and the duration for transmitting the packet. Once hearing the RTS or CTS mes-sage, any other station will update its NAV (network allocation vector), which records the duration when the channel is busy, and defer its access to the channel.

In the IEEE 802.11 standard [1], the four-way handshaking is used to reduce the collision time when the size of the transmitted data packet is greater than a predefined length, i.e.,

RTSThreshold. Otherwise, the two-way handshaking is used.

The four- way handshaking can also avoid the hidden terminal problem.

EDCF, which is an enhanced version of DCF, can provide a distributed access mechanism to support service differentiation in IEEE 802.11. EDCF introduces the concept of access cat-egories (ACs). Traffic classes belonging to different ACs use different values of CWmin, CWmax, and arbitration interframe

spacing number (AIFSN) to contend the channel. There are four ACs specified in IEEE 802.11e as shown in Table I, where the 802.11b physical layer [2] is used.

EDCF requires that a mobile station has to wait a time period of AIFS before transmitting a packet or generating a backoff counter. LetTAIF S andTSIF S denote the lengths of AIFS and short IFS (SIFS), respectively. TAIF S is computed as follows:TAIF S= TSIF S+ AIFSN × δ, where AIFSN ≥ 1 andδ is the length of a time slot. A traffic class with smaller

AIFSN has smallerTAIF S and hence has a higher probability of seizing the channel.

EDCF is backward compatible with DCF. A mobile station without EDCF has to wait at least a time period of DIFS before it can transmit a packet. Recall that IEEE 802.11 setTDIF S, the length of DIFS, to beTSIF S+ 2δ. A mobile station with EDCF has a higher probability of seizing the channel than those without EDCF, if it sets AIFSN=1.

III. ADMISSIONCONTROLGAMEFORMULATION In this section, we formulate admission control as a two-player game. The admission control game is formed when a user sends a flow request to an AP. In the following subsections, we first present the system model. Second, we review the basic concepts of two-player game. Third, we present the admission control game formulation. Fourth, an important ratio− QoS satisfaction ratio − used in the game is presented. Finally, we will prove that the game owns a Nash equilibrium solution.

A. System Model

The system environment we consider is within a local region in which multiple APs compete for providing wireless network access. We assume that different APs in the local region are belonging to different service providers. In the competitive environment, mobile users are free to choose an AP for wireless Internet services. A mobile user may leave the current AP and subscribe to wireless network access with another service provider according to the degree of QoS satisfaction for the current quality.

In order to support service differentiation, EDCF protocol is implemented in all APs and mobile stations. Suppose that there areK traffic classes with distinct QoS requirements in the system, where K ≥ 1. We assume that each mobile user has packets of the same traffic class. For convenience, we refer to a mobile user that has traffic classk packets as a class-k user. We usenkto denote the number of class-k users currently in the system, where0 ≤ k ≤ K − 1. The term rk is referred to as the data rate for traffic classk.

B. Preliminaries on Two-Player Game

In a two-player game [8], each player has a set of strategies. A configuration is a form of a pair of strategies, in which one strategy comes from one player and the other strategy comes from the other player. Associated with each configuration, i.e., a pair of two strategies, there are two payoffs, one for each player. A payoff is a number that reflects the desirability of a configuration to a player. For a noncooperative game, each player makes a decision independently and in a manner maximizes its own payoff without knowing the decisions of other players.

Specifically, a two-player non-cooperative game has two playersp and q. We assume there are m and n strategies for

p and q, denoted as {ui: 1 ≤ i ≤ m} and {vj: 1 ≤ j ≤ n},

respectively. Hence the configurations of the game are denoted by{ui, vj}, where 1 ≤ i ≤ m, 1 ≤ j ≤ n. The payoffs for p

(3)

and q are defined as two payoff matrices P = [pij]m×n and

Q = [qij]m×n. The rows ofP and Q matrices represent the

set of strategies forp while the columns represent the set of strategies forq. In other words, pij (qij) represents the payoff for p (q) as p chooses strategy i and q chooses strategy j, where 1 ≤ i ≤ m and 1 ≤ j ≤ n.

A game can be also classified into a zero-sum and a nonzero-sum game. Specifically, if pij + qij = 0 for all 1 ≤ i ≤ m and 1 ≤ j ≤ n, it is a zero-sum game; otherwise, it is a nonzero-sum game. The number of payoff matrices for a zero-sum two-player game is one since the payoff matrix for one player can be easily obtained from the other player. Note that ifpij+ qij are constant, it is also zero-sum.

In a two-player noncooperative nonzero-sum game, a con-figuration{u∗i, vj∗} is said to be a Nash equilibrium solution if the values of payoff forp and q under {u∗i, vj∗} are maximal. In other words, no player can change its strategy to get a better payoff.

It has been shown that a two-player non-cooperative nonzero-sum game may or may not have a Nash equilibrium solution [4]. However, in the proposed admission control game, we will show that it always has at least one Nash equilibrium solution, which will be presented in Section III-E.

C. Game Formulation

The proposed admission control game in the system is non-cooperative in nature. In addition, the game is also nonzero-sum. It is noted that a zero-sum game has the property that the increment for one particular payoff value will cause the decrement of the corresponding payoff value so that the summation can be zero. If a new user sends a flow request to an AP in under-loading conditions, admitting the new flow will not degrade the ongoing flows and will gain revenue for the AP. Also, the admitted user will also feel satisfied and gain its revenue. That is, both the values of payoffs for the AP and the mobile user are increasing. Therefore, the admission control game is nonzero-sum.

The two players for the admission control game are as follows:

p: the current serving AP (service provider) of the class-k

user;

q: a class-k user that intends to initiate a new flow.

The player p has the set of strategies {u1, u2}, where u1 is to admit the flow request andu2is to reject the flow request. Similarly, the playerq has the set of strategies {v1, v2}, where

v1 is to leave the current serving AP and subscribe to another one and v2 is to stay at the current AP.

We now define the payoff matricesP = [pij]2×2forp,which is given as P =  R + (Rk− L) − Lk R + (Rk− L) R − Lk R  .

The notations used inP are defined as follows.

R: the sum of revenues for the current ongoing flows; Rk: the revenue obtained by admitting a class-k user; Lk: the revenue loss obtained when a class-k user leaves;

Bk: the bandwidth violation ratio for a class-k user. Bk is defined as Bk=  0 if ρk/nk− rk > 0 rk−ρk/nk rk if ρk/nk− rk≤ 0 ,

where ρk/nk is the average available bandwidth for a class-k user. The bandwidth violation ratio is zero when-ever the average available bandwidth is greater than the data rate, i.e.,ρk/nk−rk > 0. Otherwise, the bandwidth violation ratio is defined asrk−ρrk/nk

k . The estimation for

ρk can refer to [6] and is not state here;

L: potential revenue loss obtained by admitting a class-k

user. When an AP admits a new flow to transmit in its coverage range, it may cause potential revenue loss for the AP. It is because that each time a new flow is allowed to transmit in the system, the system may be overloading and then the QoS satisfactions of ongoing flows will be degraded;

S(Bk): the QoS satisfaction ratio that represents the

degree a class-k user satisfies the current quality. The satisfaction ratio is a function of bandwidth violation ratio. It is noted that 0 ≤ S(Bk) ≤ 1. The detailed derivation forS(Bk) will be shown in Section III-D. O(Bk): the QoS dissatisfaction ratio that represents the

degree a class-k user dissatisfies the current quality.

O(Bk) also represents the inclination that a class-k user

intends to leave the current AP. It is noted thatO(Bk) = 1 − S(Bk).

The elementp21represents that the class-k user will leave the current AP and the current AP will reject the flow request. Hence the value of p21 is simply the sum of revenues of the current ongoing flows minus the revenue loss obtained by the leaving of the class-k user, i.e., R − Lk. The value of p22 is simplyR since the class-k user does not leave the current AP and may keep trying to request later.

The values of p12 should consider the potential loss and hence the value of p12 is R + Rk− L. Similarly, the value ofp11isR + Rk− L − Lk. We estimate the potential loss in terms of potential departures of ongoing users. The departures stem from the QoS dissatisfaction for the current quality. For class-k users, the potential revenue loss is nkO(Bk)Lk and the total potential revenue loss for all users is hence L = K−1

i=0 niO(Bi)Li.

Now let us discuss the payoff matrixQ = [qij]2×2. LetUk, (Vk) be the revenue obtained when the flow request is admitted (rejected). Apparently,Uk > Vk. The payoff matrixQ is given as Q =  Uk− Yk Uk− wO(Bk) Vk− Yk Vk− wO(Bk)  ,

whereYk andw are the revenue loss when the class-k leaves the current AP and the multiplier factor, respectively.Yk may be the money need to pay for the leaving plus the money need to subscribe to wireless network access with another service provider. Other explanation forYk is also possible by considering more realistic market mechanisms.

(4)

The elementq11(q21) corresponds to the configuration that the AP admits (rejects) the flow request and the class-k user leaves the current AP. Hence the value of payoff forq11(q21) isUk− Yk (Vk− Yk). The elementsq12andq22 should minus an additional term wO(Bk) since the user which chooses

to stay at the current AP may need to tolerate the possible dissatisfaction. The term w is a multiplier factor and larger than 1.

Once the payoff matrices forp and q are defined, the next step is to show that if this game owns a Nash equilibrium solution or not, which will show in Section III-E. Before we show the existence of Nash equilibrium solution, we derive two important ratios− QoS satisfaction ratio and QoS dissatisfaction ratio− in the following subsection.

D. QoS Satisfaction Ratio

We characterize the degree of QoS satisfaction for a

class-k user as a function of bandwidth violation ratio. That is,

the degree of QoS satisfaction for a class-k user depends on the quality of available bandwidth. We approximate the QoS satisfaction ratio,S(Bk), by using the Sigmoid function

[9]. The Sigmoid function has been used to characterize users’ satisfaction in recent literature [7], [11]. We modify the Sigmoid function to involve user’s satisfaction with respect to the bandwidth violation ratio, i.e.,

S(Bk) =1 + e−α1kk−Bk),

where αk and βk are the steepness and the center of curve.

αk and βk are used to indicate the sensitivity of bandwidth

violation and the toleration of bandwidth violation for traffic

class k. The greater the value of αk is, the lower sensitivity of QoS degradation for traffic class k is. Fig. 1 shows the plot of QoS satisfaction ratio versus bandwidth violation ratio, where αk=20, 30, 40 and 50, respectively. In Fig. 1, we know that the steepness of the curve is increasing as αk is increasing and hence the sensitivity of bandwidth violation is decreasing. Similarly, the higher value of βk is, the higher toleration for the bandwidth violation is, as depicted in Fig. 2. Once the bandwidth violation ratio is greater than βk, the degree of users’ satisfaction (i.e., QoS satisfaction ratio) will be degraded dramatically.

OnceS(Bk) has been defined, the QoS dissatisfaction ratio

O(Bk) is simply given as 1 − S(Bk).

E. Equilibrium Solutions

Before discussing the existence of Nash equilibrium solu-tion, we first explain the concept of domination.

Definition 1: In a two-player non-cooperative game, a

strat-egy u∗i dominates another strategyu∗j of p if it obtains better playoff regardless of what the strategy q chooses, where 1 < i, j < m.

Theorem 1: The proposed admission control game

pos-sesses at least one Nash equilibrium solution.

Proof: We consider the proof in three cases:

Rk− L > 0

In this case, u1 dominates u2 and hence p will always

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Bandwidth violation ratio B

k

QoS satisfaction ratio

S( Bk ) αk=10 αk=20 αk=30 αk=40 β=0.3

Fig. 1. QoS satisfaction ratio S(Bk) vs. bandwidth violation ratio Bk (αk=10, 20, 30 ,40;βk=0.3). 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Bandwidth violation ratio B

k

QoS satisfaction ratio

S( Bk ) βk=0.2 βk=0.3 βk=0.4 βk=0.5 αk=20

Fig. 2. QoS satisfaction ratio S(Bk) vs. bandwidth violation ratio Bk (βk=0.2, 0.3, 0.4 ,0.5;αk=20).

choose strategyu1. Therefore, q will choose v1 if Uk−

Yk > Uk − wO(Bk); otherwise q will choose v2. The resulting configuration may be{u1, v1} or {u1, v2}.

Rk− L = 0

It is trivial that four configurations are all possible.

Rk− L < 0

This reasoning process is similar with Rk− L > 0 and the resulting configuration may be{u2, v1} or {u2, v2}.

IV. PERFORMANCEEVALUATION

We simulated the MAC layer protocol based on EDCF. The underlying physical layer we adopt is the IEEE 802.11b standard [2] and the channel bit rate is assumed to be 11 Mbps where multi-rate capability is not supported [1]. The values of

(5)

TABLE II

PARAMETERS USED IN THE SIMULATION

PHY header 48µs

Preamble duration 144µs Average channel bit rate 11 Mbps Propagation delay 1µs

TSIF S 20µs

Length of time slot 10µs MAC header 272 bits

RTS 160 bits CTS 112 bits ACK 112 bits RTSThreshold 1000 byres R0,R1,R2 20, 10, 6 L0,L1,L2 10, 5, 3 Y0,Y1,Y2 30, 25, 15 U0,U1,U2 5, 5, 5 V0,V1,V2 0, 0, 0 w 5 TABLE III TRAFFIC CHARACTERISTICS. Voice Video FTP

Codec algorithm G.729 H.263 N/A

Average packet inter-arrival time (ms) 20 40 best effort

Payload length (byte) 20 500 1500

Bit rate (Kbps) 8 100 best effort

CWmin 8 16 32

CWmax 16 32 1024

AIFSN 1 1 2

Minimum required bandwidth (Kbps) 8 100 0 Maximum delay toleration (ms) 5 5

parameters used in the simulation are summarized in Table II. There are three traffic classes in the simulation: voice, video and FTP. We assume that voice, video and FTP are mapping to traffic class 0, traffic class 1 and traffic class 2 respectively. The traffic characteristics for these three traffic classes are shown as Table III. It is noted that a FTP flow has no QoS guarantee, i.e., the minimum required bandwidth is zero and the maximum delay toleration is infinite.

The proposed admission control game was simulated to show the performance under an overloading condition, i.e., the system cannot admit any class-k flow to transmit for 0 ≤ k ≤ 2. In order to create an overloading environment, the traffic load is continuously offered in the order − one voice flow, one video flow and three FTP flows − until the system cannot admit any class-k flow for 0 ≤ k ≤ 2.

For simplicity and convenience, the sensitivities of band-width violations and tolerations of bandband-width violations for voice and video flows are assumed to be equal, i.e.,α0= α1 and β0 = β1, and are denote by α∗ and β∗ respectively. In order to reflect the high toleration of FTP flows, we let

TABLE IV

NUMBER OF ADMITTED FLOWS(α∗= 10). β∗ n0 n1 n2 0.1 6 2 2 0.2 11 5 6 0.3 10 8 19 0.4 10 9 22 0.5 11 10 22 0.6 12 11 25 0.7 13 12 28 0.8 15 13 31 0.9 16 14 37 1.0 17 15 40 α2= ∞ and β2= 1.

In Table IV, we show the number of admitted flows in the proposed admission control game, in which the sensitivities of bandwidth violation for voice and video flows are set to 10, i.e.,α∗= 10. In Table IV, we tune the tolerations of bandwidth violations for voice and video flows. It can be seen that asβ∗ is greater, the number of admitted flows for each traffic class is greater. System administrators can tune the value ofβ∗ by considering the tradeoff between QoS guarantees of ongoing flows and the revenue.

In Fig. 3, we show the average throughput for each traffic class in the proposed admission control scheme under different values of sensitivity of bandwidth violations and toleration of bandwidth violations. In Fig. 3(a), the average throughput for voice flows is higher asα∗is smaller. Similarly, Fig. 5(b) and Fig. 5(c) which show the average throughput for video flows and FTP flows also have the same situation with Fig. 5(a). As seen from Fig. 5(a), Fig. 5(b), and Fig. 5(c), the average throughput for each traffic is decreasing asβ∗ is increasing. The reason is that the number of admitted flows is increasing asβ∗ is increasing.

In Fig. 4, we show the average packet delays for different traffic classes under different values of sensitivity of bandwidth violations and toleration of bandwidth violations. The average packet delay for each traffic class is greater as β∗ is greater. Also, the average packet delay for each traffic class is greater asα∗ is smaller.

Fig. 5 shows the bandwidth violation ratios for voice and video flows. As β∗ is greater, the number of admitted flows is greater and hence the bandwidth violation ratio is greater.

V. CONCLUSION

In this paper, we analyzed admission control problem by using game theoretical framework. The system environment we considered was within a local region in which multiple service providers compete for providing wireless Internet ser-vices. EDCF protocol was implemented in all APs and mobile stations to provide service differentiation. In the competitive environment, we addressed on the resource management prob-lem that how to increase the revenue for service providers while fulfill most part of QoS satisfactions of ongoing flows. In the further research, we will consider both real-time and best effort traffic and investigate joint admission and rate

(6)

0 0.5 1 2 4 6 8 10 12 14 16 18

Toleration of bandwidth violation β*

Average throughput for voice flows

ρ0 /n0 (Kbps) voice 0 0.5 1 20 40 60 80 100 120 140 160 180 200 220

Toleration of bandwidth violation β*

Average throughput for video flows

ρ1 /n1 (Kbps) video 0 0.5 1 0 10 20 30 40 50 60 70 80

Toleration of bandwidth violation β*

Average throughput for FTP flows

ρ2 /n2 (Kbps) FTP α*=10 α*=50 α *=10 α*=50 α *=10 α*=50 (a) (b) (c)

Fig. 3. Average throughput vs. toleration of bandwidth violation. (a) average throughput for voice flows. (b) average throughput for video flows. (c) average throughput for FTP flows.

0 0.5 1 0 10 20 30 40 50 60 70 80

Toleration of bandwidth violation β*

Average packet delay for voice flows (ms)

voice 0 0.5 1 0 5 10 15 20 25 30 35 40

Toleration of bandwidth violation β*

Average packet delay for video flows (ms)

video 0 0.5 1 0 20 40 60 80 100 120 140 160 180

Toleration of bandwidth violation β*

Average packet delay for FTP flows (ms)

FTP α*=10 α*=50 α *=10 α*=50 α *=10 α*=50 (a) (b) (c)

Fig. 4. Average packet delay vs. toleration of bandwidth violation. (a) average packet delay for voice flows. (b) average packet delay for video flows. (c) average packet delay for FTP flows.

controls to not only provide QoS for real-time traffic but also ensure throughput for best effort traffic.

REFERENCES

[1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11, 1999.

[2] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High-speed Physical Layer Extension in the 2.4GHz Band, IEEE Standard 802.11b, 1999.

[3] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Medium Access Control (MAC) Enhancements for Quality of Service (QoS), IEEE Standard 802.11e/D4.1, February 2003. [4] T. Basar and G. T. Olsder, Dynamic Noncooperative Game Theory, 2nd

Ed., Society of Industrial and Applied Mathematics, 1999.

0 0.2 0.4 0.6 0.8 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Toleration of bandwidth violation β*

Bandwidth violation ratio for voice flows

B0 voice 0 0.2 0.4 0.6 0.8 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Toleration of bandwidth violation β*

Bandwidth violation ratio for video flows

B 1 video α*=10 α*=50 α *=10 α*=50 (a) (b)

Fig. 5. Bandwidth violation ratio vs. toleration of bandwidth violation. (a) bandwidth violation ratio for voice flows. (b) bandwidth violation ratio for video flows.

[5] D. Gu and J. Zhang, ”QoS enhancement in IEEE 802.11 wireless local area networks,” IEEE Communication Magazine, vol. 41, pp. 120-124, June 2003.

[6] Y. L. Kuo, C. H. Lu, H. K. Wu, and G. H. Chen, ”An admission control strategy for differentiated services in IEEE 802.11,” Proceedings of the IEEE Global Communications Conference (GLOBECOM), vol. 2, San Francisco, December 2003, pp. 707-712.

[7] H. Lin, M. Chatterjee, S. K. Das, and K. Basu, ”ARC: An inte-grated admission and rate control for CDMA Networks based on non-cooperative games.” Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom), San Diego, California, Septmber 2003, pp. 326-338.

[8] R. B. Myerson, Game Theory: Analysia of Conflict. Cambridge, MA: Harvard University Press, 1991.

[9] D. Seggern, CRC Standard Curves and Surfaces, Boca Raton, FL, CRC Press, pp. 124, 1993.

[10] U. Varshney, ”The status and future of 802.11-based WLANs,” Com-puter, vol. 3, pp. 102-105, June 2003.

[11] M. Xiao, N. B. Shroff, E. K. P. Chong, ”Utility-based power control in cellular wireless systems”, Proceedings of the IEEE International Conference on Computer Communication (INFOCOM), vol. 1, 2001, pp. 412-421.

數據

Fig. 1. QoS satisfaction ratio S(B k ) vs. bandwidth violation ratio B k
TABLE II
Fig. 5. Bandwidth violation ratio vs. toleration of bandwidth violation. (a) bandwidth violation ratio for voice flows

參考文獻

相關文件

To provide additional teaching staff for schools to take forward various education initiatives and enhance the quality of education for the benefit of our students, the current

In case of non UPnP AV scenario, any application (acting as a Control Point) can invoke the QosManager service for setting up the Quality of Service for a particular traffic..

Internal service Quality, Customer and Job Satisfaction: Linkages and Implications for Management.. Putting the Service-Profit Chain

Followed by the use of an important degree of satisfaction with the service quality attributes, by Kano two-dimensional quality model, IPA analysis and

In order to accurately represent the student's importance and degree of satisfaction towards school service quality, as well as to design a questionnaire survey and

Therefore, this research is for the purpose of understanding the service of privatization nursery, discussing parents’ satisfaction with service quality and finding the

This study aims to explore whether the service quality and customer satisfaction have a positive impact on the organizational performance of the services and whether the

This study is aimed to investigate the current status and correlative between job characteristics and job satisfaction for employees in the Irrigation Associations, by