(ProQuest: ... denotes non-US-ASCII text omitted.)
Shun-Pin Hsu 1 and Shun-Liang Hsu 2 and Alan Shenghan Tsai 1
Recommended by Xiaoning Zhang
1, Department of Electrical Engineering, National Chung Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan
2, Department of Law and Graduate Institute of Technology Management, National Chung Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan
Received 2 October 2012; Revised 22 December 2012; Accepted 26 December 2012
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
With the widespread use of internet and the increasing popularity of mobile devices, more and more people can get online at almost anytime and anywhere. An immediate challenge facing the significant increment of online users is the support of quality of service (QoS). Over the past decade considerable efforts have been made to ensure the smooth operation of the networking systems. For example, the load balancing problems were considered by Anselmi et al. [ 1] and Ayesta et al. [ 2]. The routing problems were studied by La and Anantharam [ 3], Richman and Shimkin [ 4], Boulogne et al. [ 5], and Korilis et al. [ 6- 8]. Niyato and Hossain [ 9] studied the practical issue such as the admission control for the wireless broadband standard. Ganesh et al. [ 10] and Yaïche et al. [ 11] considered the pricing issues. In modeling the networking problems, quite often the bandwidth availability is the main concern and has its role in the associated performance measure. The network system quantifies the results caused by different operation scenarios and seeks the approach leading to the greatest benefits in some sense. Since the benefit of any network user inevitably involves that of other users, its evaluation is mostly carried out in the context of game theory. In the survey paper Altman et al. collected a long list of networking models based on game theoretic formulation. Interested readers are referred to [ 12] and the rich reference therein.
As mentioned above, the bandwidth availability is the major concern in many networking problems. The bandwidth allocation is thus the core issue as far as the quality of service is concerned. While the bandwidth allocation problem was considered by many authors in different contexts of networking protocols or communication standards (see e.g., [ 9, 11, 13, 14]), at a high level of abstraction the problem can be regarded as the classical resources distribution problem studied in many professional fields such as economics, management science, and operations research. Given a finite number of units competing for the limited resources, how does each unit decide its share based on its own utility function? Lazar et al. [ 15] formulated this problem for the network composed of noncooperative users. Under certain monotonicity, differentiability, and convexity assumptions on the cost function the unique existence and certain fairness property of the Nash equilibrium point (NEP) were proved. An algorithm based on Gauss-Seidel and Jacobi schemes was proposed and proved to yield a sequence converging to the NEP. However, the framework in [ 15] assumes only the natural constraint for the bandwidth allocation. That is, the feasible bandwidth of any user falls within the interval lower bounded by zero and upper bounded by the bandwidth available for that user. In practice some techniques such as the bandwidth throttling and bandwidth/traffic shaping [ 16] are available to provide more adaptive bandwidth control. To address this issue, Rhee and Konstantopoulos [ 17, 18] relaxed the assumption and allowed some prespecified numbers for the upper and lower bounds of the bandwidth. This relaxation increases the flexibility of flow control and helps the QoS satisfaction by the networking system. On the other hand, in modern broadband communication systems some users might form a group and expect the group-wise QoS, in addition to the user-wise one. For example, the customers of an internet service provider (ISP) might include the individuals and a company with many employees. To maintain the QoS, parameters would be assigned to bound the bandwidth of each individual and each employee. Furthermore the ISP and the company would set the constraint for the employee-averaged, or equivalently, employee-totaled bandwidth, as shown in Figure 1. A similar concept of group constraint can be seen in the cost-effective broadband access network such as the Ethernet-based passive optical network (EPON) [ 19, 20]. This system is composed of an optical line terminal (OLT) and many optical network units (ONUs). The OLT is situated in the central office and ONUs are distributed over the remote areas for multimedia communication with the subscribers. In the upload process each ONU adopts the time division multiplexing access (TDMA) protocol to transmit data frames to the OLT, in the sense that each ONU only transmits the data during the time slots specifically scheduled for it [ 21]. The protocol avoids the frame collisions between different ONUs at the cost of imposing the upper bound for the time-average flow of each ONU and the upper bound for the total flow of all ONUs.
Figure 1: The system bandwidth allocation r = ( r 1 , r 2 , ... , r n ) subject to user-wise constraints: r _ i ...4; r i ...4; r - i for i ∈ {1,2 , ... ,n } , and a user-grouping constraint R _ g ...4; ∑ i =1 m ... r i ...4; R - g . The total allocation R = ∑ i =1 n ... r i is less than T , the total bandwidth.
[figure omitted; refer to PDF]
In light of the bandwidth sharing mechanism in EPON and other similar systems, we extend the existing results to include the user-grouping constraint for better model fitting. Suppose each user has his or her own utility function that describes the relation between the allocated bandwidth and the resultant benefit to that user. Following the standard assumptions, (1) the function depends on the bandwidth of the user, and on the bandwidth of other users only through their total bandwidth, and (2) the function satisfies certain continuity and concavity properties; we show the unique existence and the fairness with some appropriate sense, of the NEP in the allocation game. The contributions of our work are twofold. First, a novel concept called user-grouping NEP is proposed. This concept is corresponding to the new introduction of the group constraint, under which the uniqueness of NEP proved in [ 15, 17] no longer holds. Based on this concept we give a new definition for the equilibrium point and prove its uniqueness under our assumptions. The fairness of the allocation based on the user-grouping NEP is also proved. Second, we show that the Gauss-Seidel type algorithm in [ 15, 18] can be modified to yield a sequence converging to the user-grouping NEP. Since the bandwidth allocation is of central concern in networking systems, our results might result in the reinvestigation and reformulation of other networking issues such that more practical approaches can be developed.
2. Preliminaries
Suppose a networking system has n users and they compete for the system bandwidth. Each user is assigned with the bandwidth subject to predecided upper and lower bounds. In addition, m of the n users form a group and the total bandwidth of the m users is also subject to a predecided constraint. We would like to design the system bandwidth allocation policy that optimizes the performance index of each user in the game-theoretical sense. For convenience, we use the list of nomenclature shown at the end of the paper.
Assume the utility function for each user depends on the bandwidth of that user and the total bandwidth of other users. That is, the utility function for user i in ...A9; can be written as U i ( r i ,R ) . Also, assume the utility function satisfies the following continuity and concavity properties [ 18]:
Assumption 1.
For each utility function U i ( r i ,R )
(a) U i ( r i ,R ) is continuously differentiable with respect to r i ;
(b) ( ∂ / ∂ r i ) U i ( r i ,R ) is strictly decreasing with respect to r i and nonincreasing with respect to R .
Now we define the allocation function. For user i in ...A9; \ [physics M-matrix] with the available bandwidth T i , the allocation function A i is defined as [figure omitted; refer to PDF] For user i in [physics M-matrix] with the available bandwidth T i and inside-group information T i g , the allocation function ...9C; i is defined as [figure omitted; refer to PDF]
Assumption 2.
The bandwidth allocation with the constraint parameters has the following properties:
(a) T i > ...9C; i ( T i , T i g ) for each feasible T i and T i g where i ∈ [physics M-matrix] , and T i > A i ( T i ) for each feasible T i where i ∈ ...A9; \ [physics M-matrix] ;
(b) ∑ i =1 m ... r - i > R - g > R _ g > ∑ i =1 m ... r _ i .
In our framework, the classical Nash equilibrium point (NEP) in the allocation game is defined as [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Note that C i is {r |" r _ i ...4;r ...4; r - i , R _ g ...4;r + ∑ j ∈ [physics M-matrix] \ {i } ... r j * ...4; R - g } if i ∈ [physics M-matrix] and is {r |" r _ i ...4;r ...4; r - i } otherwise. The user-grouping NEP is defined as [figure omitted; refer to PDF] where [figure omitted; refer to PDF]
Remark 3.
The definitions ( 3)-( 4) reflect the central concept of the well-studied constrained NEP. That is, given the constrained strategy space C i for each user i ∈ ...A9; , r i * is defined as the maximizer of the utility function of user i provided that the strategy r j * is adopted by user j for each j ∈ ...A9; \ {i } . Note that the bandwidth of users in the group [physics M-matrix] should satisfy the extra group constraint and thus r i * might lose its uniqueness in C i as the group constraint is active. The novel concept of user-grouping NEP in ( 5)-( 6) is thus proposed to compensate the property of the equilibrium point. We will show in Section 3.1that our setting ensures the uniqueness of the user-grouping NEP.
Remark 4.
Suppose T i * : =T - ∑ j ...0;i n ... r j * . Also, let T i g * : = R - g - ∑ j ...0;i m ... r j * , then [figure omitted; refer to PDF] By part (a) in Assumption 2we have [figure omitted; refer to PDF] Consequently, [figure omitted; refer to PDF] This means that the NEP, or r * , satisfies the natural constraint R * ...4;T and the constraint is always inactive. Part (b) in Assumption 2is a natural condition such that the constraint R _ g ...4; ∑ i =1 m ... r i ...4; R - g makes sense.
The existence of the NEP in our setting is guaranteed by Rosen's result in the following.
Theorem 5 (see [ 22, Theorem 1]).
An equilibrium point exists for every concave n -person game.
Theorem 5can be obtained using the classical Kakutani fixed point theorem and in some sense generalizes Nash's setting on the strategy space of the users [ 23, 24]. In the next section we delve into other properties and propose an algorithm to locate the NEP.
3. Main Results
3.1. Uniqueness
Our first result is concerned with the uniqueness of the user-grouping NEP. This property as shown in [ 18, page 13] is not implied by the uniqueness theorem in [ 22]. For the NEP r * = ( r 1 * , r 2 * , ... , r n * ) defined in ( 3)-( 4), the Karash-Kuhn-Tucker (KKT) conditions must be satisfied. That is, for each i ∈ ...A9; \ [physics M-matrix] there exist KKT multipliers λ - i * and λ _ i * (see e.g., [ 25, page 458]) such that [figure omitted; refer to PDF] In addition, for each i ∈ [physics M-matrix] there exist KKT multipliers λ - i * and λ _ i * satisfying ( 11)-( 14), and γ - i * and γ _ i * satisfying [figure omitted; refer to PDF] where R g * is defined in ( 6).
Lemma 6.
For each i ∈ ...A9; \ [physics M-matrix] , let r i (1 ) : = A i ( T i (1 ) ) and r i (2 ) : = A i ( T i (2 ) ) for some feasible T i (1 ) and T i (2 ) , then [figure omitted; refer to PDF] where the nonnegative KKT multipliers λ - i (1 ) , λ _ i (1 ) , λ - i (2 ) and λ _ i (2 ) satisfy [figure omitted; refer to PDF]
Proof.
Since r i (1 ) and r i (2 ) are both feasible, r i (1 ) > r i (2 ) implies λ _ i (1 ) =0 and λ - i (2 ) =0 by ( 21) and ( 22), respectively. Consequently, the result follows since λ - i (1 ) ...5;0 and λ _ i (2 ) ...5;0 .
Theorem 7.
The user-grouping NEP defined in ( 5) is unique.
Proof.
Suppose r (1 ) = ( r 1 ( 1 ) , r 2 ( 1 ) , ... , r n (1 ) ) and r (2 ) = ( r 1 ( 2 ) , r 2 ( 2 ) , ... , r n (2 ) ) are both the equilibrium points. Let R (1 ) = ∑ i =1 n ... r i (1 ) and R (2 ) = ∑ i =1 n ... r i (2 ) . We can thus write for i ∈ ...A9; \ [physics M-matrix] that [figure omitted; refer to PDF] where λ - i (1 ) , λ _ i (1 ) , λ - i (2 ) , λ _ i (2 ) are the associated KKT multipliers. Assume that R (1 ) > R (2 ) . If there exists i ∈ ...A9; \ [physics M-matrix] such that r i (1 ) > r i (2 ) , by Lemma 6and Assumption 1we have [figure omitted; refer to PDF] which is a contradiction. We thus have r i (1 ) ...4; r i (2 ) for i in ...A9; \ [physics M-matrix] . This implies R g (1 ) : = ∑ i =1 m ... r i (1 ) > ∑ i =2 m ... r i (2 ) = R g (2 ) . Note that, for i ∈ [physics M-matrix] , [figure omitted; refer to PDF] With similar arguments in proving Lemma 6we can show that [figure omitted; refer to PDF] If r i (1 ) > r i (2 ) for some i ∈ [physics M-matrix] , we have [figure omitted; refer to PDF] which is a contradiction. We thus have r i (i ) ...4; r i (2 ) for each i ∈ [physics M-matrix] and therefore R g (1 ) ...4; R g (2 ) , also a contradiction. With analogous arguments we can show that assuming R (1 ) < R (2 ) also leads to a contradiction. Therefore R (1 ) = R (2 ) and by Lemma 6 r i (1 ) = r i (2 ) for i ∈ ...A9; \ [physics M-matrix] . This implies R g (1 ) = R g (2 ) ; therefore r g * is unique.
3.2. Fairness
A bandwidth allocation r = ( r 1 , r 2 , ... , r n ) is said to be fair if for any feasible t 1 and t 2 [figure omitted; refer to PDF] where i ,j ∈ [physics M-matrix] , and for any feasible t [figure omitted; refer to PDF] where i ,j ∈ ...A9; \ [physics M-matrix] . This definition suggests that a fair allocation guarantees the user in greater need of bandwidth actually obtains more bandwidth.
Theorem 8.
The bandwidth allocation based on the NEP defined in ( 3)-( 4) is fair.
Proof.
Suppose i ∈ [physics M-matrix] . Let r i (1 ) = ...9C; i ( T i (1 ) ,t ) and r i (2 ) = ...9C; i ( T i (1 ) + ΔT , t + ΔT ) . We thus have [figure omitted; refer to PDF] Assume r i (2 ) - ΔT > r i (1 ) , which implies r i (2 ) > r i (1 ) and by Lemma 6 λ - i (2 ) - λ _ i (2 ) ...5; λ - i (1 ) - λ _ i (1 ) . Also, [figure omitted; refer to PDF] Similarly, [figure omitted; refer to PDF] Note that ( 32) implies γ - i (2 ) - γ _ i (2 ) ...5; γ - i (1 ) - γ _ i (1 ) . We then have [figure omitted; refer to PDF] which is a contradiction. Therefore, r i (2 ) - ΔT ...4; r i (1 ) , which implies [figure omitted; refer to PDF] namely, [figure omitted; refer to PDF] To show the allocation based on r * is fair, consider first the case that i ,j ∈ [physics M-matrix] . By definition r i * = ...9C; i ( T i * , T i g * ) , r j * : = ...9C; j ( T j * , T j g * ) where T i * , T i g * , T j * and T j g * are all feasible. With R * defined in ( 9) we have [figure omitted; refer to PDF] which equals the remaining bandwidth of the system after allocation. Given ...9C; i ( T i * , T i g * ) > ...9C; j ( T i * , T i g * ) , we have [figure omitted; refer to PDF] Note that [figure omitted; refer to PDF] Equations ( 35) and ( 37) imply Δ T * >0 ; hence r i * > r j * . The case for i ,j ∈ ...A9; \ [physics M-matrix] can be similarly proved and is thus ignored (see [ 18, Theorem 2.3] for details).
3.3. Algorithm
In this section we analyze the scheme to identify the user-grouping Nash equilibrium point. We say an individual update is implemented on user i if the bandwidth of each user other than i is fixed and the bandwidth of user i is updated to maximize his or her utility function. In addition, we say a batch update occurs in the collection ...A6; of users if the bandwidth of each user not in ...A6; is fixed and the individual update is sequentially implemented on each user in ...A6; repeatedly till an equilibrium is reached. Here ...A6; is either [physics M-matrix] or ...A9; \ [physics M-matrix] . If ...A6; = [physics M-matrix] the batch update is implemented assuming no group constraint, namely, R - g = ∞ and R _ g =0 . Note that the batch update is guaranteed to reach an equilibrium (see [ 15] and [ 18, Section 2.4]). As a result, suppose r k = ( r 1 k , r 1 k , ... , r n k ) is the system allocation at step k . If an individual update occurs at user i ∈ ...A9; \ [physics M-matrix] at step k +1 , that means r j k +1 = r j k for j ∈ ...A9; \ {i } , and [figure omitted; refer to PDF] for some KKT multipliers λ - i k +1 and λ - i k +1 and R k +1 = ∑ i =1 n ... r i k +1 . If a batch update occurs at the group of users at step k +1 , that means r j k +1 = r j k for each j ∈ ...A9; \ [physics M-matrix] , and we can write for each i ∈ [physics M-matrix] [figure omitted; refer to PDF] where λ - i k +1 , λ - i k +1 , γ - i k +1 and γ - i k +1 are the associated KKT multipliers. We now show that a repeated implementation of sequential batch updates on users in [physics M-matrix] and users in ...A9; \ [physics M-matrix] , as outline in Algorithm 1, yields a sequence converging to the user-grouping NEP r g * in ( 5). Define first the error measure e ( r g k ) between r g k and r g * as [figure omitted; refer to PDF] where R g k : = ∑ i =1 m ... r i k . R g * and R * are defined in ( 6) and ( 9), respectively.
The scheme to locate the user-grouping NEP.
(P1) Initiate the algorithm with a feasible r g and set s =0 .
(P2) (if current step is k ) Perform a batch update for users in [physics M-matrix] at step k +1
by assigning r j k +1 = r j k for all j ∈ ...A9; \ [physics M-matrix] ,
to reach r i k +1 = ...9C; i ( T i k +1 , T i g ,k +1 ) for all i ∈ [physics M-matrix] .
(P3) (if current step is k ^ ) Perform an individual update at user i in ...A9; \ [physics M-matrix]
by assigning r j k ^ +1 = r j k ^ for all j ∈ ...A9; \ {i } ,
to reach r i k ^ +1 = A i ( T i k ^ ) , and let k ^ = k ^ +1 .
Sequentially implement this whole procedure till each user in ...A9; \ [physics M-matrix]
is updated.
(P4) Repeat (P3) to complete a batch update at users in ...A9; \ [physics M-matrix] .
(P5) Set s =s +1 and record the current r g as ... (s ) .
If || ... (s ) - ... (s -1 ) || < [straight epsilon] then stops, otherwise go to (P2).
Lemma 9.
The error measure e ( r g k ) defined in ( 41) is nonincreasing, namely, e ( r g k +1 ) ...4;e ( r g k ) for any positive integer k .
Proof.
If at step k +1 an individual update occurs at i ∈ ...A9; \ [physics M-matrix] , ( 39) is satisfied. Since ( 10) is also satisfied, we have by Lemma 6and part (b) in Assumption 1that [figure omitted; refer to PDF] Under the assumption [figure omitted; refer to PDF] Suppose R k +1 ...5; R * . If R k ...5; R k +1 , then [figure omitted; refer to PDF] Since R k < R k +1 implies r i k < r i k +1 , we have [figure omitted; refer to PDF] Using similar arguments we can analyze the case for R k +1 < R * and obtain also that e ( r g k +1 ) ...4;e ( r g k ) . If at step k +1 a batch update occurs, ( 15) and ( 40) hold for each i ∈ [physics M-matrix] . Suppose R k +1 ...5; R * . If there exists an i ∈ [physics M-matrix] such that r i k +1 > r i * then part (b) in Assumption 1implies [figure omitted; refer to PDF] therefore by ( 26) R g * ...5; R g k +1 . If no such i exists, namely, r i k +1 ...4; r * for each i ∈ [physics M-matrix] , then naturally R g k +1 ...4; R g * . A similar result can be derived for the case R k +1 ...4; R * . We then have [figure omitted; refer to PDF] Now [figure omitted; refer to PDF] Assume R k +1 ...5; R * . If R k ...5; R k +1 then [figure omitted; refer to PDF] If R k < R k +1 , which is equivalent to R g k < R g k +1 , then [figure omitted; refer to PDF] Applying similar arguments again we can analyze the case for R k +1 < R * and obtain also that e ( r g k +1 ) ...4;e ( r g k ) .
Theorem 10.
Algorithm 1yields a sequence { r g k } k =1 ∞ converging to r g * , the user-grouping NEP of the bandwidth allocation game.
Proof.
In the light of Lemma 9, we only need to show that for each positive integer k , r g k ...0; r g * implies the existence of a finite integer k 1 such that e ( r g k + k 1 ) <e ( r g k ) . Suppose it is not the case Then there exists some k such that e ( r g k + k 2 ) =e ( r g k ) for any positive integer k 2 , where r g k ...0; r g * . Consider the update scheme that, at step k +i -m for i ∈ ...A9; \ [physics M-matrix] , the individual update occurs at user i , and at step k +n +1 -m the batch update takes place for users in [physics M-matrix] . Without loss of generality we assume R k +n +1 -m ...5; R * , then R g (k +n +1 -m ) ...4; R g * by ( 47). Since e ( r g k +n +1 -m ) =e ( r g k +n -m ) , ( 50) together with ( 51) implies R k +n -m ...5; R * ; hence R g k +n -m ...4; R g * . That is, R · - R * and R g · - R g * do not change their signs as the step number is increased from k +n -m to k +n +1 -m . Moreover, R k +n -m ...5; R * implies r n k +n -m ...4; r n * . Since e ( r g k +n +1 -m ) =e ( r g k +i -m -1 ) for i ∈ ...A9; \ [physics M-matrix] , ( 44) and ( 45) together imply R k +i -m ...5; R * and thus r i k +i -m ...4; r i * , for i ∈ ...A9; \ [physics M-matrix] . As a result, r i k +n -m ...4; r i * for i ∈ ...A9; \ [physics M-matrix] . Note that R g k +n -m ...4; R g * and [figure omitted; refer to PDF] We conclude that R g k +n -m = R g * and r i k +n -m = r i * for i ∈ ...A9; \ [physics M-matrix] , namely, r g k = r g * , a contradiction.
4. A Numerical Example
Consider a data communication network system with 100 users. Suppose 30 of them form a group. We then have ...A9; = {1,2 , ... ,100 } and [physics M-matrix] = {1,2 , ... ,30 } . The adopted utility function is [figure omitted; refer to PDF] where the parameters α i 's are listed in Table 1. Note that the utility function, known as the generalized power function [ 26], has the continuity and concavity properties required by Assumption 1. In particular, it can be shown [ 18, page 11] easily that the maximizer [figure omitted; refer to PDF] and thus part (a) in Assumption 2is satisfied. Suppose the total available bandwidth T =6000 , and the upper and lower bounds for total bandwidth allocated to the group is R - g =2000 and R _ g =800 , respectively. Assume that the individual bandwidth constraint for each user in Table 2is used. Clearly these parameters satisfy the natural requirements of part (b) in Assumption 2. Applying Algorithm 1yields a dynamic bandwidth allocation evolving with the implementation step, as shown in Figure 2. The left part of the figure shows the evolution of total bandwidth allocated to the group, which is composed of user 1, user 2, up to user 30. At the beginning of the algorithm, an initial feasible bandwidth allocation is allocated to each user of the system. Fix the total bandwidth allocated to the users not in the group and find the optimal total bandwidth R g . In the example R g is 3950.3. Since this value is greater than the upper bound R - g =2000 . R g is replaced with R - g . Fix this R g we have the total available bandwidth T - R g =6000 -2000 =4000 for users not in the group. Based on this availability of the bandwidth we can find the equilibrium point for users not in the group. In the example we have, for instance, the bandwidth r 70 =50 , r 90 =57.554 , and r 100 =38.0004 . Now fix the total bandwidth of the users not in the group, and find the optimal bandwidth R g again. In the example we obtain R g =2115.8 . Since this value is greater than the upper bound R - g =2000 , R g is replaced with R - g again. Note that the current optimal bandwidth allocation for each user outside the group is found based on the condition that the total bandwidth for the group is R - g . The current R - g and r m +1 , ... , r n is thus the R - g * and r m +1 * , ... , r n * for the user-grouping NEP in ( 5).
Table 1: The parameters of α i for i ∈ ...A9; = {1,2 , ... ,100 } .
i | α i | |||||||||
1-10 | .6111 | .7052 | .0283 | .5209 | .2591 | .5082 | .9732 | .8182 | .8588 | .8966 |
11-20 | .2995 | .8800 | .2552 | .1921 | .1866 | .8611 | .4446 | .3866 | .8320 | .2065 |
21-30 | .8978 | .4595 | .1634 | .2687 | .5207 | .7724 | .3874 | .0444 | .9868 | .5230 |
31-40 | .8437 | .8919 | .6856 | .5178 | .4420 | .3801 | .0318 | .2159 | .0853 | .7969 |
41-50 | .4018 | .0498 | .3165 | .8712 | .9314 | .4257 | .8662 | .4806 | .9083 | .2505 |
51-60 | .5266 | .2448 | .8384 | .5257 | .3498 | .2571 | .1688 | .5992 | .8110 | .8489 |
61-70 | .8448 | .2350 | .5083 | .6694 | .0907 | .5430 | .2980 | .3818 | .5339 | .4265 |
71-80 | .2320 | .0284 | .0260 | .2743 | .6945 | .3300 | .7505 | .7957 | .0537 | .0092 |
81-90 | .7281 | .6644 | .5853 | .9190 | .1673 | .9720 | .2196 | .0382 | .7078 | .2290 |
91-100 | .3526 | .7095 | .5887 | .1088 | .6468 | .7311 | .8634 | .0226 | .5252 | .1512 |
Table 2: The bandwidth constraint for each user.
User ( i ) | 1-10 | 11-20 | 21-30 | 31-70 | 71-90 | 91-100 |
Upper bound ( r - i ) | 100 | 200 | 290 | 50 | 78 | 100 |
Lower bound ( r _ i ) | 10 | 20 | 30 | 5 | 10 | 22 |
The sequence generated by Algorithm 1for the example.
(a) [figure omitted; refer to PDF]
(b) [figure omitted; refer to PDF]
5. Conclusion
We have proposed a novel bandwidth allocation model based on game theory. The consideration of the user-grouping constraint distinguishes this model from the abundant ones concerning similar allocation issues. Suppose each user competes for the system bandwidth resources and is granted with a constrained decision space. In particular, some users are united in one group and the total bandwidth allocated to the group is constrained as well. Given the appropriate constraint parameters and the utility function satisfying mild continuity and concavity conditions for each user, we have shown the unique existence of the user-grouping Nash equilibrium point for the allocation game. In addition, we have shown the fairness, in a proper sense, of the allocation based on this equilibrium point. Finally, we have proposed an iterative algorithm and proved that a sequence converging to the point can be generated by the algorithm. A practical example illustrating a network satisfying our settings has been given to show how the equilibrium point can be located successfully.
Nomenclature
...A9; :
The index set for the users, that is, ...A9; : = {1,2 , ... ,n }
[physics M-matrix] :
The index set for the users in the group, that is, [physics M-matrix] : = {1,2 , ... ,m }
...A9; \ [physics M-matrix] :
The index set for the users not in the group, that is, ...A9; \ [physics M-matrix] : = {m ,m +1 , ... ,n }
r i :
The bandwidth allocated to user i
r _ i :
Lower bound for r i
r - i :
Upper bound for r i
R g :
Total bandwidth allocated to the group members, that is, R g : = r 1 + r 2 + ... + r m
R _ g :
Lower bound for R g
R - g :
Upper bound for R g
T :
Total bandwidth available in the system
R :
Total bandwidth allocated, that is, R : = r 1 + r 2 + ... + r n
R -i :
Total bandwidth allocated, excluding to user i , that is, R -i : = r 1 + ... + r i -1 + r i +1 + ... + r n
T i :
Total bandwidth available for user i , that is, T i : =T - R -i
T i g :
Inside-group information for user i ∈ [physics M-matrix] , that is, T i g : = R - g - ∑ j ...0;i m r j .
Acknowledgment
This research was supported by the National Science Council of Taiwan under Grant NSC 100-2221-E-005-071.
[1] J. Anselmi, U. Ayesta, A. Wierman, "Competition yields efficiency in load balancing games," Evaluation , vol. 68, no. 11, pp. 986-1001, 2011.
[2] U. Ayesta, O. Brun, B. J. Prabhu, "Price of anarchy in non-cooperative load balancing games," Performance Evaluation , vol. 68, no. 12, pp. 1312-1332, 2011.
[3] R. J. La, V. Anantharam, "Optimal routing control: repeated game approach," IEEE Transactions on Automatic Control , vol. 47, no. 3, pp. 437-450, 2002.
[4] O. Richman, N. Shimkin, "Topological uniqueness of the nash equilibrium for selfish routing with atomic users," Mathematics of Operations Research , vol. 32, no. 1, pp. 215-232, 2007.
[5] T. Boulogne, E. Altman, H. Kameda, O. Pourtallier, "Mixed equilibrium (ME) for multiclass routing games," IEEE Transactions on Automatic Control , vol. 47, no. 6, pp. 903-916, 2002.
[6] Y. A. Korilis, A. A. Lazar, A. Orda, "Architecting noncooperative networks," IEEE Journal on Selected Areas in Communications , vol. 13, no. 7, pp. 1241-1251, 1995.
[7] Y. A. Korilis, A. A. Lazar, A. Orda, "Achieving network optima using Stackelberg routing strategies," IEEE/ACM Transactions on Networking , vol. 5, no. 1, pp. 161-173, 1997.
[8] Y. A. Korilis, A. A. Lazar, A. Orda, "Capacity allocation under noncooperative routing," IEEE Transactions on Automatic Control , vol. 42, no. 3, pp. 309-325, 1997.
[9] D. Niyato, E. Hossain, "QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: a non-cooperative game theoretic approach," Computer Networks , vol. 51, no. 11, pp. 3305-3321, 2007.
[10] A. Ganesh, K. Laevens, R. Steinberg, "Congestion pricing and noncooperative games in communication networks," Operations Research , vol. 55, no. 3, pp. 430-438, 2007.
[11] H. Yaïche, R. R. Mazumdar, C. Rosenberg, "A game theoretic framework for bandwidth allocation and pricing in broadband networks," IEEE/ACM Transactions on Networking , vol. 8, no. 5, pp. 667-678, 2000.
[12] E. Altman, T. Boulogne, R. El-Azouzi, T. Jiménez, L. Wynter, "A survey on networking games in telecommunications," Computers & Operations Research , vol. 33, no. 2, pp. 286-311, 2006.
[13] F. Bonomi, K. W. Fendick, "Rate -based flow control framework for the available bit rate ATM service," IEEE Network , vol. 9, no. 2, pp. 25-39, 1995.
[14] D. Niyato, E. Hossain, "Queue-aware uplink bandwidth allocation and rate control for polling service in IEEE 802.16 broadband wireless networks," IEEE Transactions on Mobile Computing , vol. 5, no. 6, pp. 668-679, 2006.
[15] A. A. Lazar, A. Orda, D. E. Pendarakis, "Virtual path bandwidth allocation in multiuser networks," IEEE/ACM Transactions on Networking , vol. 5, no. 6, pp. 861-871, 1997.
[16] J. W. Evans, C. Filsfils Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice , Morgan Kaufmann, Boston, Mass, USA, 2007., 1st.
[17] S. H. Rhee, T. Konstantopoulos, "Decentralized optimal flow control with constrained source rates," IEEE Communications Letters , vol. 3, no. 6, pp. 188-190, 1999.
[18] S. H. Rhee Optimal flow control and bandwidth allocation in multiservice networks: decentralized approaches [Ph.D. thesis] , The University of Texas at Austin, 1999.
[19] C. M. Assi, Y. Ye, S. Dixit, M. A. Ali, "Dynamic bandwidth allocation for quality-of-service over ethernet PONs," IEEE Journal on Selected Areas in Communications , vol. 21, no. 9, pp. 1467-1477, 2003.
[20] J. Xie, S. Jiang, Y. Jiang, "A dynamic bandwidth allocation scheme for differentiated services in EPONs," IEEE Communications Magazine , vol. 42, no. 8, pp. 32-39, 2004.
[21] S. I. Choi, J. D. Huh, "Dynamic bandwidth allocation algorithm for multimedia services over ethernet PONs," ETRI Journal , vol. 24, no. 6, pp. 465-468, 2002.
[22] J. B. Rosen, "Existence and uniqueness of equilibrium points for concave n -person games," Econometrica , vol. 33, pp. 520-534, 1965.
[23] J. F. Nash, "Equilibrium points in n -person games," Proceedings of the National Academy of Sciences of the United States of America , vol. 36, pp. 48-49, 1950.
[24] J. Nash, "Non-cooperative games," Annals of Mathematics, Second Series , vol. 54, pp. 286-295, 1951.
[25] E. K. P. Chong, S. H. Zak An Introduction to Optimization , Wiley-Interscience, Hoboken, NJ, USA, 2008., 3rd.
[26] A. Bovopoulos, A. Lazar, "Decentralized algorithms for optimal flow control," in Proceedings of the 25th Allerton Conference on Communication, Control, and Computing, pp. 979-988, 1987.
[]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2013 Shun-Pin Hsu et al. Shun-Pin Hsu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
A new bandwidth allocation model is studied in this paper. In this model, a system, such as a communication network, is composed of a finite number of users, and they compete for limited bandwidth resources. Each user adopts the decision that maximizes his or her own benefit characterized by the utility function. The decision space of each user is subject to constraints. In addition, some users form a group, and their joint decision space is also subject to constraints. Under the assumption that each user's utility function satisfies some continuity and concavity conditions, the existence, uniqueness, and fairness, in some appropriate sense, of the Nash equilibrium point in the allocation game are proved. An algorithm yielding a sequence converging to the equilibrium point is proposed. Finally, a numerical example with detailed analysis is provided to illustrate the effectiveness of our work.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





