4,922 research outputs found
Controlled Matching Game for Resource Allocation and User Association in WLANs
In multi-rate IEEE 802.11 WLANs, the traditional user association based on
the strongest received signal and the well known anomaly of the MAC protocol
can lead to overloaded Access Points (APs), and poor or heterogeneous
performance. Our goal is to propose an alternative game-theoretic approach for
association. We model the joint resource allocation and user association as a
matching game with complementarities and peer effects consisting of selfish
players solely interested in their individual throughputs. Using recent
game-theoretic results we first show that various resource sharing protocols
actually fall in the scope of the set of stability-inducing resource allocation
schemes. The game makes an extensive use of the Nash bargaining and some of its
related properties that allow to control the incentives of the players. We show
that the proposed mechanism can greatly improve the efficiency of 802.11 with
heterogeneous nodes and reduce the negative impact of peer effects such as its
MAC anomaly. The mechanism can be implemented as a virtual connectivity
management layer to achieve efficient APs-user associations without
modification of the MAC layer
Accurate non-intrusive residual bandwidth estimation in WMNs
The multi-access scheme of 802.11 wireless networks imposes difficulties in achieving predictable service quality in multi-hop networks. In such networks, the residual capacity of wireless links should be estimated for resource allocation services such as flow admission control. In this paper, we propose an accurate and non-intrusive method to estimate the residual bandwidth of an 802.11 link. Inputs from neighboring network activity measurements and from a basic collision detection mechanism are fed to the analytical model so that the proposed algorithm calculates the maximum allowable traffic level for this link. We evaluate the efficiency of the method via OPNET simulations, and show that the percent estimation error is significantly lower than two other prominent estimation methods, bounded only between 2.5-7.5%. We also demonstrate that flow admission control is successfully achieved in a realistic WMN scenario. Flow control through our proposed algorithm keeps the unsatisfied traffic demand bounded and at a negligibly low level, which is less than an order of magnitude of the other two methods
Adaptive Resource Control in 2-hop Ad-Hoc Networks
This paper presents a simple resource control\ud
mechanism with traffic scheduling for 2-hop ad-hoc networks, in\ud
which the Request-To-Send (RTS) packet is utilized to deliver\ud
feedback information. With this feedback information, the\ud
Transmission Opportunity (TXOP) limit of the sources can be\ud
controlled to balance the traffic. Furthermore, a bottleneck\ud
transmission scheduling scheme is introduced to provide fairness\ud
between local and forwarding flows. The proposed mechanism is\ud
modeled and evaluated using the well-known 20-sim dynamic\ud
system simulator. Experimental results show that a fairer and\ud
more efficient bandwidth utilization can be achieved than\ud
without the feedback mechanism. The use of the structured and\ud
formalized control-theoretical modeling framework has as\ud
advantage that results can be obtained in a fast and efficient way
Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi
We study the fair coexistence of scheduled and random access transmitters
sharing the same frequency channel. Interest in coexistence is topical due to
the need for emerging unlicensed LTE technologies to coexist fairly with WiFi.
However, this interest is not confined to LTE/WiFi as coexistence is likely to
become increasingly commonplace in IoT networks and beyond 5G. In this article
we show that mixing scheduled and random access incurs and inherent
throughput/delay cost, the cost of heterogeneity. We derive the joint
proportional fair rate allocation, which casts useful light on current LTE/WiFi
discussions. We present experimental results on inter-technology detection and
consider the impact of imperfect carrier sensing.Comment: 14 pages, 8 figures, journa
- âŠ