Optimal Resource Allocation in Wireless Ad Hoc Networks A Price-based Approach,” in
- 格式:pdf
- 大小:793.78 KB
- 文档页数:35
摘要本文主要工作是介绍OMNeT++仿真平台,并基于OMNeT++搭建Ad hoc网络环境来进行仿真试验。
首先是详细介绍OMNeT++仿真器的构成原理,尤其是对其NED语言和编程语法等做深入讲解,同时也对OMNeT++的移动框架(MF,Mobility Framework)组成原理进行了系统的讲解,因为它为我们提供了仿真无线移动网络所需各种基本模块,把我们从设计底层的模块结构和拓扑结构中解放出来,让我们能够把精力放在具体协议的实现上,加快了搭建仿真网络的过程,最后是进行Ad hoc 网络仿真环境的搭建,并在该环境中对在计算机网络中常用来检测网络连通性的Ping 命令进行了仿真试验,并对抽取所需的数据进行分析。
关键字网络仿真OMNeT++ Ad hoc网络AbstractThe main work of this thesis introduces the OMNeT++, and organize a Ad hoc network for the simulation test based on OMNeT++. Firstly, it introduces the structure of OMNeT++ in detail, especially its NED language and the syntax of program, as well as OMNeT++’s Mobile Framework (MF, Mobility Framework) principle, because it provides with basic modules for wireless and mobile network simulation, and free from the designing of the bottom of the module’s structure and topological, so that , it can put more efforts on the achievement of the realization of the protocol, speed up the simulation process. At last, it organizes an Ad hoc network, and simulate the Ping instruction, which is always used in the computer network to detect the network’s connectivity, at the same time, it collects the required data for analysis.Key words Network Simulation OMNeT + + Ad hoc Network目录摘要 (I)Abstract (II)第1章绪论 (1)1.1 课题背景与意义 (1)1.2 本文的主要工作 (2)1.3 本文的组织结构 (3)第2章OMNeT++基础 (4)2.1 OMNeT++简介 (4)2.2 OMNET++框架 (6)2.2.1 OMNeT++组成 (6)2.2.2 OMNeT++框架 (7)2.3 OMNeT++语法 (8)2.3.1 NED语言 (8)2.3.2 简单模块算法实现和消息传递 (11)2.4 MF移动框架 (14)2.4.1 主机模型 (14)2.4.2 信道控制模块 (16)2.4.3 基本概念 (18)第3章Ad hoc网络基础 (22)3.1 Ad Hoc网络的概念 (22)3.2 Ad hoc网络特点 (23)3.3 Ad hoc网络协议栈 (25)3.4 Ad hoc网络的应用领域 (26)第4章Ad hoc网络仿真的实现 (29)4.1 仿真试验 (29)4.1.1 NIC模块 (30)4.1.2 移动模块 (32)4.1.3 网络层模块 (32)4.1.4 信道控制模块 (35)4.1.5 应用层模块 (36)4.2 仿真结果分析 (37)4.2.1 丢包分析 (37)4.2.2 往返时延分析 (38)4.2.3 数据分析 (38)结论 (39)致谢 (40)参考文献 (41)附录1 外文文献译文 (43)附录2 外文文献原文 (48)第1章绪论1.1 课题背景与意义由于研究方向的不同,许多领域,并不太适合采用实地试验的方式,或者是为了节省时间、资金等目的,最好采用仿真的方式。
Ad hoc无线网络
张靖
【期刊名称】《中国电子科学研究院学报》
【年(卷),期】2004(000)006
【摘要】Ad hoc网络是没有基础设施的无线网络,本文介绍了Ad hoc无线网络原理、类型和性能特点,详细分析了其关键技术,描述了应用范围和特点.
【总页数】7页(P29-35)
【作者】张靖
【作者单位】中国电子科学研究院
【正文语种】中文
【中图分类】TN92
【相关文献】
1.物联网下自组织无线网络Ad Hoc算法的新技术设计 [J], 李瑞江
2.一种改进的Ad Hoc无线网络连通支配集生成方法 [J], 黄庆东;闫乔乔;孙晴
3.适应于搜救环境利用Ad hoc无线网络的机器人SLAM [J], 王洪玲;张承进;宋勇;庞豹
4.适应于搜救环境利用Adhoc无线网络的机器人SLAM [J], 王洪玲;张承进;宋勇;庞豹;;;;;
5.基于A-Star算法的Ad Hoc无线网络\r最优路由模型研究 [J], 刘熙明;魏旭;窦立刚;覃洪波;杨露溪
因版权原因,仅展示原文概要,查看原文内容请购买。
无线网络下的资源分配和能量优化研究无线网络是指通过无线通信技术将设备连接起来,实现信息传输和资源共享的网络。
在无线网络中,资源分配和能量优化是关键问题,直接影响网络的性能和能源消耗。
本文将对无线网络下的资源分配和能量优化进行研究和讨论。
首先,资源分配是指在无线网络中如何合理地分配有限的资源给不同的用户或应用。
资源包括频谱、功率、时间等。
在传统的无线网络中,频谱资源是有限的,各个用户或应用之间需要进行公平的频谱分配,以保证网络的可靠性和吞吐量。
而在最近兴起的物联网中,大量的终端设备同时连接到网络,对频谱资源的分配提出了新的需求和挑战。
针对资源分配问题,研究者们提出了各种算法和方案。
一种常用的方法是通过动态频谱分配实现资源的最优分配。
这种方法能够实时地根据网络和用户的需求动态调整频谱分配,提高频谱利用率和用户体验。
另一种方法是使用博弈论的理论和方法进行资源分配。
博弈论可以描述多个用户或应用之间的相互影响和冲突,并通过分析和优化来获得最优的资源分配策略。
除了频谱资源外,功率和时间资源也需要进行合理的分配。
例如,功率优化可以通过分配合适的功率给不同的用户或应用来提高网络的覆盖范围和传输质量。
时间资源分配可以通过分配合适的时间片给不同的用户或应用来提高网络的容量和吞吐量。
其次,能量优化是指在无线网络中如何最大化地利用有限的能源,延长网络设备的续航时间。
无线网络设备通常由电池供电,能源消耗是限制设备续航时间的重要因素。
能量优化的目标是通过合理地控制设备的功率消耗,减少能源的浪费,并延长设备的使用时间。
在能量优化的研究中,一种常见的方法是使用动态功率控制。
动态功率控制是通过根据网络和用户的需求动态调整设备的发射功率来实现能量的最优消耗。
例如,在网络拥塞情况下,可以降低设备的功率以减少干扰和能源消耗。
另一种方法是无线传感器网络中的能量平衡。
传感器网络通常由大量的低能耗设备组成,如何在节点之间合理地分配能量,使网络中的节点时间同步,从而实现能量的均衡和延长网络寿命。
Ad Hoc网络的区域划分和网络抗毁性分析摘要本文探讨了如何合理地对Ad Hoc网络区域进行划分。
针对区域内节点状态和区域有湖、无湖的状况,给出了每一种情况下区域的划分方案、信道分配方案和网络抗毁率。
问题1:讨论了用正多边形覆盖平面的问题,发现只有正三角形、正方形和正六边形拼装起来能够完全覆盖平面。
当相交部分不小于5%时,用45个圆可以完全覆盖全部区域,选择3个通信信道即可;当相交部分不小于18%时,用64个圆可以完全覆盖全部区域,选择2个通信信道即可完全进行数据交换。
用抗毁率来衡量网络的抗毁性,在抽取掉相同比例的节点数时,发现正六边形覆盖方案比正方形覆盖方案的网络抗毁率大一些。
问题2:在无湖的情况下,全部采用半径为100的圆覆盖整个区域。
考虑到有湖情况,将覆盖湖区的两个圆去掉后出现了两个盲区,用半径分别为75和75.1545的半径的圆即可将这个区域完全覆盖,总的半径之和为4450.1545,整个区域需要分配3个信道即可。
问题3:要求使用基于节点的划分方式时,本文使用K-means聚类算法对节点进行分类,对每一个类用一个尽量小的圆去覆盖,得出了覆盖每个类的圆的最小半径,然后对节点的连通性进行了验证,对于有转发任务的相邻的圆公共面积占大圆面积的比例小于5%的情况,采用增大小圆半径的方法解决,最后得到无湖情况下,用57个簇可将926个节点完全覆盖,需要分配3个信道来满足数据交换要求。
问题4:用计算机模拟前10个节点的运动,当达到400单位时间后,计算出前10个点的新坐标,然后重新建立所有节点之间的最短路径矩阵,判断网络是否连通。
随机模拟2000次,计算出网络连通的概率为0.549。
关键词:抗毁性;Dijkstra算法;K-means聚类算法一问题的重述Ad Hoc网络有着无需基站、无需特定交换和路由节点、随机组建、灵活接入、移动方便等特点,可以实现在任意环境下自由通信,同时也为军事通信、灾难救助和临时通信提供了有效的解决方案,具有极大的吸引力。
一种无线Ad Hoc网络中的公平带宽分配算法
张晓梅
【期刊名称】《武汉理工大学学报(信息与管理工程版)》
【年(卷),期】2009(031)003
【摘要】针对如何公平有效地分配无线带宽的问题,提出了一种有效带宽分配算法,该算法能确保在无线多跳ad hoc网络模型中的各个用户分配到公平带宽资源.该算法在每一跳都能够公平地分配给每个竞争流相应的信道时间比例,依据这些时间比例,每一跳为经过自己的所有数据流计算更新速率,而每条数据流的源端能够根据更新速率来调节它的下一时刻发送速率,以达到它应该占有的公平份额.这种公平性被称为信道时间最大最小公平性.实验结果表明,所提出的这种信道时间最大最小公平性算法能够在无线多跳数据流中公平地分配带宽并达到高的信道时间资源利用率.【总页数】4页(P387-390)
【作者】张晓梅
【作者单位】上海工程技术大学计算中心,上海,201620
【正文语种】中文
【中图分类】TP393.1
【相关文献】
1.一种多无线电系统中基于公平性和精细化带宽分配的资源分配算法 [J], 潘甦;曹跑跑;刘胜美
2.认知无线网络中兼顾效用与公平的联合带宽和功率分配算法 [J], 闫继垒;李建东;
赵林靖;董全
3.无线Ad hoc网络中基于0-1优化的两步骤资源分配算法 [J], 刘蔚;赵宇;陈锐
4.一种无线Ad Hoc网络中的最大最小公平性带宽分配优化方法 [J], 占小利;谭连生;赵甫哲
5.一种新的无线Ad hoc网络中的多路径路由及流量分配算法 [J], 王辉;单剑锋;俞能海
因版权原因,仅展示原文概要,查看原文内容请购买。
第11章 无仿真边界(Boundless Simulation Area ,BSA )移动模型369 和T B 。
在考虑所有邻居到达N 0的情况下,对链路持续时间进行测量,其表达式如下:LD 2A B T T T += (11-30) 这是A T 和T B 的算术平均值,其权重相同。
另一方面,如果N 0随机地选择一个现有的邻居,并观察邻居的持续时间,则平均持续时间会变为 2222LD A B A B A B A B T T T T T T T T T λλλλ++′==++ (11-31)这是T A 和T B 的算术平均值,权重为每种类型邻居的平均数,即A T λ和B T λ。
可看出,如果A B T T ≠,那么样本平均LD T ′总是大于实际的平均LD T ,这叫做检验悖论(inspection paradox )。
这是合理的假设:单跳链路的剩余持续时间是LDT ′的一半。
因此,单跳链路的剩余持续时间值大于LD /2T 。
11.5 小结在这章里详细地例证了:BSA 移动模型的性能优于其他移动模型(如RWP 和RW )的性能。
因为BSA 模型在仿真区域的边界处不受边界效应的影响,且它的理论值和仿真结果非常吻合。
在无线Ad Hoc 网络中,恒定速度(Constant Velocity ,CV )模型一直用于评估移动性和连接稳定性之间的关系。
尽管简单,但仿真结果证明:CV 模型能相当准确地描述单跳通信的行为。
此外,对移动性度量参数链路持续时间(LD )及与LD 相关的多跳路由的寿命(Lifespan )进行了估计。
采用不同移动模型的大量仿真结果例证了:不管采用什么移动模型,LD 和平均路由寿命之间的关系都是恒定不变的。
还通过证明多跳路由的寿命是LD 的一个函数,来解释为什么LD 是一个好的移动性度量参数。
而且,还证明了链路变化率(LCR )不能像LD 一样作为统一的移动性参数,它和路由寿命之间的关系取决于节点密度(在有些模型中节点的密度是非均匀的)。
Optimal Resource Allocation in Wireless Ad Hoc Networks:A Price-based ApproachYuan Xue,Baochun Li,Klara NahrstedtAbstractThe shared-medium multi-hop nature of wireless ad hoc networks poses fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different networkflows.None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-endflows spanning multiple hops.Moreover,strategies proposed in wireline networks are not applicable in the context of wireless ad hoc networks,due to their unique characteristics of location-dependent contention.In this paper,we propose a new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-endflows.We build our pricing framework on the notion of maximal cliques in wireless ad hoc networks,as compared to individual links in traditional wide-area wireline networks.Based on such a price-based theoretical framework,we present a two-tier iterative algorithm.Distributed across wireless nodes,the algorithm converges to a global network optimum with respect to resource allocations.We further improve the algorithm towards asynchronous network settings,and prove its convergence.Extensive simulations under a variety of network environments have been conducted to validate our theoretical claims.Index TermsC.2.1.k Wireless communication,C.2.8.a Algorithm/protocol design and analysis,G.1.6.h Nonlinear program-mingI.I NTRODUCTIONA wireless ad hoc network consists of a collection of wireless nodes without afixed infrastructure. Each node in the network forwards packets for its peer nodes,and each end-to-endflow traverses multiple hops of wireless links from a source to a pared with wireline networks whereflows only contend at the router that performsflow scheduling(contention in the time domain),the unique characteristics of multi-hop wireless networks show thatflows also compete for shared channel if they are Yuan Xue,Klara Nahrstedt are affiliated with the Department of Computer Science,University of Illinois at Urbana-Champaign.Their email addresses are{xue,klara}@.Baochun Li is affiliated with the Department of Electrical and Computer Engineering,University of Toronto.His email address is bli@.within the interference ranges of each other(contention in the spatial domain).This presents the problem of designing a topology-aware resource allocation algorithm that is both optimal with respect to resource utilization and fair across contending multi-hopflows.In previous work,fair packet scheduling mechanisms have been proposed[1],[2],[3]and shown to perform effectively in providing fair shares among single-hopflows in wireless ad hoc networks,and in balancing the trade-off between fairness and resource utilization.However,none of the previously proposed algorithms has considered end-to-endflows spanning multiple hops,which reflect the reality in wireless ad hoc networks.While these mechanisms may be sufficient for maintaining basic fairness properties among localizedflows,they do not coordinate intra-flow resource allocations between upstream and downstream hops of an end-to-endflow,and thus will not be able to achieve global optimum with respect to resource utilization and fairness.Due to the complexities of such intra-flow coordinations,we are naturally led to a price-based strategy, where prices are computed as signals to reflect relations between resource demands and supplies,and are used to coordinate the resource allocations at multiple hops.Previous research in wireline network pricing (e.g.,[4],[5],[6])has shown that pricing is effective as a means to arbitrate resource allocation.In these research results,a shadow price is associated with a wireline link to reflect relations between the traffic load of the link and its bandwidth capacity.A utility is associated with an end-to-endflow to reflect its resource requirement.Transmission rates are chosen to respond to the aggregated price signals along end-to-endflows such that the net benefits(the difference between utility and cost)offlows are maximized.It has been shown that[4],[5]at equilibrium,such a price-based strategy of resource allocation may achieve global optimum,where resource is optimally utilized.Moreover,by choosing appropriate utilities,various fairness models can be achieved.Unfortunately,there exist fundamental differences between multi-hop wireless ad hoc networks and traditional wireline networks,preventing verbatim applications of the existing pricing theories.In multi-hop wireless networks,flows that traverse the same geographical vicinity contend for the same wireless channel capacity.This is in sharp contrast with wireline networks,where onlyflows that traverse the same link contend for its capacity.When it comes to pricing,we may conveniently associate shadow prices with individual links in wireline networks to reflect their resource demand and supply.This is not feasible in wireless networks with the presence of location dependent contention.Due to the decentralized andself-organizing nature of ad hoc networks,the quest for a fully distributed and adaptive algorithm further exacerbates the problem.In this paper,we address these unique characteristics of wireless ad hoc networks,and follow a price-based strategy to allocate channel bandwidth to competing multi-hopflows.The fundamental question we seek to answer is:how much bandwidth should we allocate to each of the end-to-endflows,so that scarce resources in a wireless network may be optimally and fairly utilized?Towards this goal,our original contributions are two-fold.First,we build a pricing framework specifically tailored to the contention model of wireless networks,and establish shadow prices based on the notion of maximal cliques in wireless link contention graphs,rather than individual links as in wireline networks.In such a price-based theoretical framework,the price of an end-to-end multi-hopflow is the aggregate of prices of all its subflows,while the price of each of the subflows is the sum of shadow prices of all maximal cliques that it belongs to. With our new pricing framework,by choosing the appropriate utility functions,the optimality of resource allocations—in terms of both fairness and utilization—may be achieved by maximizing the aggregated utility across allflows.Second,we present a two-tier distributed algorithm to compute the bandwidth allocation for each of the end-to-endflows based on our price-based theoretical framework.Thefirst tier of the algorithm constitutes an iterative algorithm that determines per-clique shadow prices and end-to-endflow resource allocations.We show that this algorithm converges to the unique equilibrium where the aggregated utility is maximized.The second tier of the algorithm constructs the maximal cliques in a distributed manner.To facilitate its deployment in practical network environments,the algorithm is further improved to accommodate asynchronous communications.We have performed extensive simulations under a variety of network settings and showed that our solution is practical for multi-hop wireless networks. The remainder of this paper is organized as follows.Wefirst present our price-based theoretical framework in wireless ad hoc networks(Sec.II and Sec.III).We then proceed to design a two-tier decentralized algorithm in Sec.IV,which is further refined to accommodate asynchrony in Sec.V.Finally, we evaluate the performance of our algorithm in a simulation-based study(Sec.VI),discuss related work (Sec.VII)and conclude the paper(Sec.VIII).II.R ESOURCE C ONSTRAINTS IN W IRELESS A D H OC N ETWORKSIn this paper,we consider a wireless ad hoc network that consists of a set of nodes V.Each node i∈V has a transmission range d tx and an interference range d int,which can be larger than d tx.Packettransmission in such a network is subject to location-dependent contention.There exist two models for packet transmission in wireless networks in the literature[7],generally referred to as the protocol model and the physical model.In the case of a single wireless channel,these two models are presented as follows.1)The Protocol Model:In the protocol model,the transmission from node i to j,(i,j∈V)is successfulif(1)the distance between these two nodes d ij satisfies d ij<d tx;(2)any node k∈V,which is within the interference range of the receiving node j,d kj≤d int is not transmitting.This model can be further refined towards the case of IEEE802.11-style MAC protocols,where the sending nodei is also required to be free of interference as it needs to receive the link layer acknowledgmentfrom the receiving node j.Specifically,any node k∈V,which is within the interference range of the nodes i or j(i.e.,d kj≤d int or d ki≤d int),is not transmitting.2)The Physical Model:This model is directly related to the physical layer characteristics.The trans-mission from node i to j is successful if the signal-to-noise ratio at the node j,SNR ij,is not smaller than a minimum threshold:SNR ij≥SNR thresh.In this paper,we focus our attention on solving problems of resource allocation based on the protocol model,with particular interest in IEEE802.11-style MAC protocols due to their popular deployment in realistic wireless systems.The problems of resource allocation under the physical model is beyond the scope of this paper,and left as a future research direction.Under the protocol model,a wireless ad hoc network can be regarded as a bidirectional graph G=(V,E).E⊆2V denotes the set of wireless links, which are formed by nodes that are within the transmission range of each other.A wireless link e∈E is represented by its end nodes i and j,i.e.,e={i,j}.In such a network,there exists a set of end-to-endflows,denoted as F.Eachflow f∈F goes through multiple hops in the network,passing a set of wireless links E(f).A single-hop data transmission in the flow f along a particular wireless link is referred to as a subflow of f.Obviously,there may exist multiple subflows along the same wireless link.We use the notation S(S⊆E)to represent a set of wireless links in G,such that each of the wireless links in S carries at least one subflow,i.e.,the wireless link is not idle.Based on the protocol model,flows in a wireless ad hoc network contend for shared resources in a location-dependent manner:two subflows contend with each other if either the source or destination of one subflow is within the interference range(d int)of the source or destination of the other.Among a setof mutually contending subflows,only one of them may transmit at any given time.Thus the aggregated rate of all subflows in such a set may not exceed the channel capacity.Formally,we consider a wireless link contention graph[3]G c=(V c,E c),in which vertices correspond to the wireless links(i.e.,V c=S), and there exists an edge between two vertices if the subflows along these two wireless links contend with each other.In a graph,a complete subgraph is referred to as a clique.A maximal clique is defined as a clique that is not contained in any other cliques.In a wireless link contention graph,the vertices in a maximal clique represent a maximal set of mutually contending wireless links,along which at most one subflow may transmit at any given time.We proceed to consider the problem of allocating rates to wireless links.We claim that a rate allocation y=(y s,s∈S)is feasible,if there exists a collision-free transmission schedule that allocates y s to s. Formally,if a rate allocation y=(y s,s∈S)is feasible,then the following condition is satisfied[2]:∀q∈Q,s∈V(q)y s≤C(1) where Q is the set of all maximal cliques in G c,and C is the channel capacity.For a clique q in the wireless link contention graph G c,V(q)⊆S is the set of its vertices.Eq.(1)gives an upper bound on the rate allocations to the wireless links.In practice,however,such a bound may not be tight,especially with carrier-sensing-multiple-access-based wireless networks(such as IEEE802.11).In this case,we introduce C q,the achievable channel capacity at a clique q.Moreformally,ifs∈V(q)y s≤C q then y=(y s,s∈S)is feasible.To this end,we observe that each maximalclique may be regarded as an independent channel resource unit with capacity C q.It motivates the use of a maximal clique as a basic resource unit for pricing in wireless ad hoc networks,as compared to the notion of a link in wireline networks.We now proceed to consider resource constraints on rate allocations amongflows.To facilitate discus-sions,we define a clique-flow matrix R={R qf},where R qf=|V(q)∩E(f)|represents the number of subflows thatflow f has in the clique q.If we treat a maximal clique as an independent resource,then the clique-flow matrix R represents the“resource usage pattern”of eachflow.Let the vector C=(C q,q∈Q) be the vector of achievable channel capacities in each of the cliques.In a wireless ad hoc network G=(V,E)with a set offlows F,there exists a feasible rate allocation x=(x f,f∈F),if and only ifRx≤C.This observation gives the constraints with respect to rate allocations to end-to-endflows in wireless ad hoc networks.(a) Network topology(b) Wireless link contention graph (d tx = d int)int)Fig.1.Resource constraints in wireless ad hoc networks:an example.We present an example to illustrate the concepts and notations defined so far.Fig.1(a)shows the topology of the network,as well as its ongoingflows.The corresponding wireless link contention graph is shown in Fig.1(b),where the interference range is the same as transmission range(d int=d tx),and in Fig.1(c),where the interference range is twice as large as the transmission range(d int=2·d tx). In this example,there are4end-to-endflows f1={{1,2},{2,3},{3,4},{4,5}},f2={{7,6},{6,3}}, f3={{6,3},{3,2},{2,1}}and f4={{5,4}}.As such,in Fig.1(b)there are three maximal cliques in the contention graph:q1={{1,2},{3,2},{3,4},{3,6}},q2={{3,2},{3,4},{4,5},{3,6}}and q3= {{3,2},{3,4},{3,6},{6,7}};in Fig.1(c),where d int=2·d tx,there is only one maximal clique q1= {{1,2},{3,2},{3,4},{3,6},{4,5},{6,7}}.We use y ij to denote the aggregated rate of all subflows along wireless link{i,j}.For example, y12=x1+x3,y36=x2+x3.In each clique,the aggregated rate may not exceed the corresponding channel capacity.In particular,when d int=d tx,y12+y32+y34+y36≤C1,y32+y34+y45+y36≤C2, y32+y34+y36+y67≤C3.When d int=2·d tx,y12+y32+y34+y36+y45+y67≤C 1.When it comes to end-to-endflow rate allocation,the resource constraint imposed by shared wireless channels is as follows.When d int=d tx,⎛⎜⎜⎜⎜⎝313031212220⎞⎟⎟⎟⎟⎠x≤C.And when d int=2·d tx,4231x≤C .In summary,the unique characteristics of location-dependent contention in wireless ad hoc networks imply a fundamentally different resource model compared to the case of wireline networks.In wireline networks,the capacity of a link represents the constraint onflows contending for its bandwidth,which is independent from other links.However,in the case of wireless ad hoc networks,the capacity of a wireless link is interrelated with other wireless links in its vicinity.Such a fundamental difference calls for a new treatment with respect to the models of resource constraints and allocations in wireless networks.Our original contribution towards this direction is one of the highlights of this paper.III.P RICE-BASED T HEORETICAL F RAMEWORK IN W IRELESS A D H OC N ETWORKSWe now formally present our new pricing framework based on previous observations with respect to resource constraints in wireless ad hoc networks.A.Primal problem:optimal resource allocationWe associate each end-to-endflow f∈F with a utility function U f(x f):R+→R+,which represents the degree of satisfaction of its corresponding end user.Moreover,we make the following assumptions about U f.–A1.On the interval I f=[m f,M f],the utility function U f is increasing,strictly concave and twice continuously differentiable.–A2.The curvature of U f is bounded away from zero on I f:−Uf(x f)≥1/κf>0.–A3.U f is additive so that the aggregated utility of rate allocation x=(x f,f∈F)isf∈FU f(x f).We investigate the problem of optimal rate allocation in the sense of maximizing the aggregated utility function,which is also referred to as the social welfare in the literature.Such an objective achieves Pareto optimality with respect to the resource utilization,and also realizes different fairness models—including proportional and max-min fairness[6]—when appropriate utility functions are specified.We argue that, the problem of optimal resource allocation in wireless ad hoc networks may be formulated as the following non-linear optimization problem(primal problem):P:maximizef∈FU f(x f)(2)subject to Rx≤C(3)over x f∈I f(4)The objective function in Eq.(2)of the optimization problem maximizes the aggregated utility of all flows.The constraint of the optimization problem(Inequality(3))is the resource constraint from the shared wireless channel as discussed in Sec.II.By optimizing towards such an objective,both optimal resource utilization and fair resource allocations may be achieved among end-to-endflows spanning multiple hops.B.Dual problem:clique-based pricing frameworkWe proceed to study how the solution to the problem P may be derived,so that optimal resource allocation in terms of both utilization and fairness may be achieved.By the assumption A1,the objective function of P in Eq.(2)is differentiable and strictly concave.In addition,the feasible region of the optimization problem in Inequality(3)and(4)is convex and compact.By non-linear optimization theory, there exists a maximizing value of argument x for the above optimization problem.Let us consider the Lagrangian form of the optimization problem P:L(x;µ)=f∈F (U f(x f)−x fq∈Qµq R qf)+q∈Qµq C q(5)whereµ=(µq,q∈Q)is a vector of Lagrange multipliers.Now we seek a decentralized solution where knowledge of utility functions of allflows is not needed. The key to decentralization is to investigate its dual problem,and to decompose the problem via pricing. Let usfirst consider the dual problem D of the primal problem P as follows.D:minµ≥0D(µ)(6)whereD(µ)=maxx f∈I fL(x;µ)(7)=f∈F maxx f∈I f(U f(x f)−x fq:E(f)∩V(q)=∅µq R qf)+q∈Qµq C qLet us also defineλf=q:E(f)∩V(q)=∅µq R qf(8) In this equation,the Lagrange multipliersµq may be interpreted as the implied cost of a unitflowaccessing the channel in the maximal clique q.More straightforwardly,µq is the shadow price of the clique q.λf,on the other hand,may be interpreted as the shadow price of theflow f.From Eq.(8),we may observe thatflow f needs to pay for all the maximal cliques that it traverses.For each clique,the price to pay is the product of the number of wireless links that f traverses in this clique and the shadow price of the clique.Alternatively,sinceλf=q:E(f)∩V(q)=∅µq R qf=s:s∈E(f)q:s∈V(q)µq(9)the shadow price of aflow is also the aggregated price of all its subflows.For each subflow,its price is the aggregated price of all the maximal cliques that it belongs to.We illustrate these observations with an example,shown in Fig.2.The wireline network shown in Fig.2(a)has a chain topology consisting of four links,associated with pricesµ1,µ2,µ3,µ4.In this case,the price of theflow f isλf= 4l=1µl.In comparison,though the wireless ad hoc network in Fig.2(b)(in this example d int=d tx)has the same topology,its maximal cliques q1={{1,2},{2,3},{3,4}}and q2={{2,3},{3,4},{4,5}}are,in effect,its units for resource allocations.Let the shadow prices of these two cliques beµ1andµ2.The price offlow f that traverses these two cliques is given byλf=3µ1+3µ2, which is the sum of the product of the number of subflows of f in each clique and the shadow price of this clique.Alternatively,the price can also be written asλf=µ1+(µ1+µ2)+(µ1+µ2)+µ2,which is the sum of the prices of its subflows.The price of each subflow is the aggregated price of all the maximal cliques that it belongs to.12345fµ1µ2µ3µ4(b) Wireless ad hoc network(a) Wireline networkFig.2.Price-based framework:a comparison.IV.T WO-TIER P RICE-BASED A LGORITHM FOR R ESOURCE A LLOCATIONSWith an objective of promoting theory to practice,we proceed to present a decentralized two-tier algorithm based on the clique-based theoretical pricing framework that we have presented.The objective of the algorithm is to achieve optimal resource allocation in wireless ad hoc networks.In thefirst tier,wedesign an iterative algorithm that determines per-clique prices andflow rate allocations.In the second tier, we present a decentralized algorithm to construct maximal cliques.Finally,we discuss the implementation choices to integrate these two tiers.A.First tier:per-clique price calculationTreating cliques as units of resource allocation,wefirst present an iterative algorithm that solves the problem P.The iterative algorithm we propose applies the gradient projection method to the dual problem D.Letφf(x f)=U f(x f)−λf x f(10) Asλf is the shadow price of theflow f,φf(x f)may be considered as the net benefit of theflow f, which is the difference between its utility and its cost.By assumption A1,φf(x f)is strictly concave and twice continuously differentiable.Therefore,a unique maximizer ofφf(x f)exists whendφf(x f) dx f =Uf(x f)−λf=0(11)We define such a maximizer as follows:x f(λf)=arg maxx f∈I f{φf(x f)}(12)Obviously,x f(λf)=[U −1f (λf)]M f mf.Here x f(λf)is generally referred to as the demand function,whichreflects the optimal rate forflow f,where its net benefit is maximized with aflow price ofλf.Now we solve the dual problem D using the gradient projection method[8].In this method,µis adjusted in the opposite direction to the gradient∇D(µ):µq(t+1)=[µq(t)−γ∂D(µ(t))∂µq]+(13)whereγis the step size.D(µ)is continuously differentiable since U f is strictly concave[8].Thus,based on Eq.(7),the q-dimension of the gradient is given as follows.∂D(µ)∂µq =C q−f:E(f)∩V(q)=∅x f(λf)R qf(14)Eq.(14)gives the difference between the resource capacity C q and its load demandf :E (f )∩V (q )=∅x f (λf )R qf ,which are the rates of all flows that pass this clique multiplied by the number of subflows they have in this clique.Substituting Eq.(14)into (13),we haveµq (t +1)=[µq (t )−γ(C q −f :E (f )∩V (q )=∅x f (λf (t ))R qf )]+(15)Eq.(15)reflects the law of supply and demand.If the demand for bandwidth at clique q exceeds its supply C q ,the resource constraint is violated.Thus,the clique price µq is increased.Otherwise,µq is reduced.We summarize the first-tier iterative algorithm in Table I,where clique q and flow f are considered as abstract entities capable of computing and communicating.In the second tier of the algorithm,details of such entities will be presented.Clique Price Update (by clique q ):At times t =1,2,...1Receive rates x f (t )from all flows f where E (f )∩V (q )=∅2Update price µq (t +1)=[µq (t )−γ(C q − f :E (f )∩V (q )=∅x f (t )R qf )]+3Send µq (t +1)to all flows f where E (f )∩V (q )=∅Rate Update (by flow f ):At times t =1,2,...4Receive channel prices µq (t )from all cliques q where E (f )∩V (q )=∅5Calculate λf (t )= q :E (f )∩V (q )=∅µq (t )R qf6Adjust ratex f (t +1)=x f (λf (t ))7Send x f (t +1)to all cliques q where E (f )∩V (q )=∅.TABLE IF IRST TIER :THE ITERATIVE ALGORITHMWe are now in a position to show the properties of this iterative algorithm.Let us define Y (f )= q ∈Q R qf ,which leads to the definition of ¯Y =max f ∈F Y (f )as,intuitively speaking,the “length”of the “longest”path.We further define Z (q )= f ∈F R qf ,leading to the definition of ¯Z=max q ∈Q Z (q )as the number of subflows at the most “congested”clique.Let ¯κ=max f ∈F κf ,where κf is the bound on the curvature of U f (·)(see assumption A2).Theorem 1.Assume that 0<γ<2/¯κ¯Y¯Z ,starting from any initial rates x (0)(x f ∈I f )and prices µ(0)≥0,every limit point (x ∗,µ∗)of the sequence (x (t ),µ(t ))generated by the algorithm in Table I is primal-dual optimal.The detailed proof of this theorem is given in our technical report [9].B.Second tier:decentralized clique constructionThefirst tier of the algorithm treats maximal cliques as entities that are able to perform the commu-nication and computation tasks.Obviously,these tasks need to be performed by the network nodes that constitute the maximal clique.As a starting point,a decentralized algorithm to construct maximal cliques is required.Since the existing maximal clique construction algorithms are centralized in nature[10], they can not be directly applied here.Nevertheless,the unique graphical properties of the wireless link contention graph may have the potential to facilitate efficient clique construction.Hereafter,we present a decentralized maximal clique construction algorithm that explores the characteristics of wireless link contention graphs.In this algorithm,the network topology is decomposed into overlapping subgraphs,and maximal cliques are constructed based only on local topological information within each of the subgraphs. Since only wireless links that are geographically close to each other will form an edge in the wireless link contention graph,the communication and computational overhead is significantly reduced.Wefirst show the implication of topological characteristics of wireless link contention graphs when it comes to constructing maximal cliques.Let us denote the maximal clique that contains wireless link s∈S as q(s)(i.e.,s∈V(q)),and the set of all maximal cliques that contain the wireless link s as Q(s)={q(s)}. We now give the subgraph of G on which Q(s)can be constructed.To facilitate discussions,we introduce the following terms.Definition1(neighbor sets).The wireless link neighbor set LN(e)of a wireless link e∈E is defined as LN(e)={e |e∩e =∅,e ∈E}.Similarly,the wireless link k-neighbor set LN k(e)of e is defined by induction:(1)LN1(e)=LN(e);and(2)LN k(e)=LN(LN k−1(e))for k>1.For s∈S⊆E,we further define SN k(s)=LN k(s)∩S.Theorem2.Let graph G c[V c(s)]be an induced subgraph of G c with V c(s)=SN2(s)⊆V c.Then G c[V c(s)]contains sufficient and necessary topological information to construct Q(s),when d int=d tx. And G c[V c(s)]contains necessary topological information to construct Q(s),when d int>d tx.Let graph G(s)be G(s)=(V(s),E(s))with E(s)=LS3(s)and V(s)={i|∃s such that i∈s and s∈SN2(s)}. G(s)is a subgraph G,and G(s)contains sufficient and necessary topological information to construct G c[V c(s)].Proof:When d int=d tx by the definitions of the wireless link contention graph and clique,it is obvious that∪q∈Q(s)V(q)=SN2(s).This shows that G c[V c(s)]contains sufficient and necessary topologicalinformation to construct Q(s).Also,for any pair of s ,s ∈SN2(s),we need to know whether they contend with each other to determine whether they are connected in G c[V c(s)].Apparently,LN3(s)contains all the topological information to construct G c[V c(s)].When d int>d tx,there may exist wireless links which interfere with each other,yet not connected by any other wireless links in the network topology.Thus G c[V c(s)]only contains necessary topological information. For wireless link s∈S,one of its vertices will be selected as its delegation node,denoted as v(s). The delegation node v(s)constructs all maximal cliques q∈Q(s)by applying the Bierstone algorithm [10]on graph G c[V c(s)].Fig.3.Example of decentralized clique constructionWe consider an example shown in Fig.3.When d int=d tx,the set of wireless links SN2({1,2})={{8,3}, {3,1},{1,2},{2,5},{5,14},{6,11},{6,12}}represents all the vertices that appear in G c[V c({1,2})].To construct all the maximal cliques Q({1,2}),the algorithm also needs to determine which wireless links in SN2({1,2})contend with each other.For example,in Fig.3,whether subflow{5,14}contends with {6,12}needs to be known to determine whether they are within the same clique.This implies that the knowledge of the wireless link{12,14}needs to be known by the algorithm for correct clique construction. Thus LN3({1,2})=SN2({1,2})∪{12,14}needs to be known.When d int>d tx,the network topology graph does not have sufficient information to infer all the interferences among wireless links.In this case, the clique construction algorithm only provides an approximation solution.For practical deployment,it will work with the measurement-based bandwidth estimation technique presented in Sec.VI,which takes into account the interferences among wireless communications.C.Two-tier algorithm:integration choicesIn thefirst tier of the algorithm,maximal clique q is considered as an entity that is able to perform the following tasks:。