Next Article in Journal
Kinetic Modeling and Analysis of Fuel Element Pneumatic Lifting System in Pebble Bed Reactors
Previous Article in Journal
An Ensemble Approach Based on Fuzzy Logic Using Machine Learning Classifiers for Android Malware Detection
Previous Article in Special Issue
A Declarative Application Framework for Evaluating Advanced V2X-Based ADAS Solutions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Game Theory-Based Load-Balancing Algorithms for Small Cells Wireless Backhaul Connections †

Communications Department, Technical University of Cluj Napoca, 400114 Cluj Napoca, Romania
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published at the 2022 45th International Conference on Telecommunications and Signal Processing (TSP).
Appl. Sci. 2023, 13(3), 1485; https://doi.org/10.3390/app13031485
Submission received: 30 November 2022 / Revised: 17 January 2023 / Accepted: 20 January 2023 / Published: 23 January 2023

Abstract

:

Featured Application

The proposed algorithms could be integrated into mobile router platforms installed in public transportation vehicles which can provide high-speed internet connectivity to the passengers and the equipment of the vehicles. The proposed algorithms also could be integrated into Access Points (APs) serving (possibly temporarily installed) small cells, APs that do not have dedicated backhaul connections, and the wireless links of some macro cells being used as backhaul connections.

Abstract

5G wireless networks have as one of the main characteristics the large-scale deployment of small cells (microcells, picocells, etc.), which is expected to bring several advantages in what concerns the high speed and low latency connectivity of the users. This large-scale deployment of small cells also raises several technical challenges, provisioning the backhaul connectivity being one of them. The paper considers the situations when small cells are deployed temporarily or are deployed in a vehicle transporting many passengers, situations when the traditional wired or wireless backhaul solutions could be too costly to be used. The paper proposes, as an alternative solution, the use as backhaul connections of the wireless links set up in the macro cells which cover the location of the small cell. The paper proposes several Game Theory (GT)-based Load-Balancing (LB) algorithms for distributing the traffic of the small cell users over the macro cell links. The proposed LB algorithms are evaluated by computer simulations and are compared with “classical” LB algorithms considered as references. The performed computer simulations show that the auction-based algorithms have the best performance in terms of delay suffered by the transmitted data packets, while the selfish routing type algorithm has weaker performance, even behaving poorly than some of the reference non-GT-based algorithms. The paper also considers the situation when several small cell APs are deployed in a limited area or a vehicle and the user groups that attach to different APs should be identified. The paper proposes two GT-based user clustering algorithms, and the performance of these algorithms are evaluated by computer simulations. These simulations show that even simple clustering algorithms could improve the distribution of the traffic over the neighbor small cell APs and reduce the delay experienced by the data packets in the transmission system.

1. Introduction

Significant increases in mobile broadband speed, connectivity for a massive number of smart devices, low latency and high reliability wireless transmissions, energy efficiency, etc., are some of the improvements brought by the 5G networks [1,2]. To fulfill the requirements mentioned above, the designers of the 5G networks propose, besides the development of new Radio Access Technologies (RATs), a new network architecture that allows the integration of heterogenous RATs and the large-scale deployment of small cells [2,3]. The deployment of many small cells raises several challenges, one of them being the provisioning of backhaul connections with large data rates, low latency, and high-reliability requirements [2]. Optical fiber links, the best solution for backhaul connections in 4G and 5G networks, might be too expensive or even impossible to be deployed in a vast number of locations and, as a viable alternative, the use of wireless backhaul is proposed [2,4]. The cost incurred by the deployment of the backhaul connections is a limiting factor of the “network densification” [5], having a significant influence on the number of small cells which can be deployed. In [6] it is presented a solution for optimization of the small cells’ deployment process according to the type and characteristics of the backhaul connections. In some circumstances, such as small cells deployed in rural areas or small cells with low traffic or offering free access, wireless mesh networks are proposed to be used as backhaul technology, or even self-backhauling in mobile frequency bands. Due to the scarcity of the spectrum used for mobile access the last solution is useful only in particular circumstances. An analysis of the usage of mesh WiFi 802.11n networks for provisioning the backhaul connections for picocells is presented in [7], and a self-optimizing partial mesh wireless backhaul solution is proposed in [8].
The architecture of the 5G networks is a complex one organized on several functional layers and is based to a large extent on technologies such as Software Defined Networks (SDN) and network function virtualization [2,9]. This could allow the use of more complex data transmission mechanisms, such as LB over several heterogeneous communication links. LB allows more efficient usage of the available resources in a heterogeneous networks scenario and this concept has already been extensively studied in the context of WiFi-3G/WiMAX/4G heterogeneous wireless networks. In [10] the authors investigate the issue of parallel transmissions over multiple RATs, focusing their attention on the Quality of Service (QoS) perceived by the final users. A simple but efficient LB algorithm is proposed and evaluated in WiFi-UMTS and mobile WiMAX systems scenarios. In [11] an improved mechanism for routing the Internet traffic over several communication paths in heterogeneous networks is proposed. The heterogeneous network is represented as a combination of multiple single technology networks available simultaneously, and each network is modeled as a single server queue. The number of jobs in each queue is minimized subject to constraints using the Lagrange multiplier. A soft LB mechanism that divides the traffic of the users into sub-flows and routes these sub-flows through different wireless access networks is presented in [12]. Soft LB involves the combined use of load distribution and vertical handover techniques. In [13] the authors adopt a fuzzy neural network approach to determine the optimal load sharing of the traffic among the heterogeneous networks and in [14] heterogeneous wireless networks are mapped to distributed grids. The authors of [14] present a hierarchical semi-centralized architecture for balancing the traffic among heterogeneous wireless networks and the proposed solution is based on the grid concept in data transmission networks. The LB mechanisms in networks involving the WiMAX and WLAN technologies are investigated in [15]. The authors consider the different service characteristics of these two networks and the QoS requirements of real-time and best effort applications and distribute all streaming flows to WiMAX networks, the remaining capacities of WiMAX and the entire capacity of WLAN being used for transmission of flows associated with non-real-time services.
The advantages of LB over heterogeneous wireless links in what concerns the resource utilization, system capacity, and fulfillment of QoS requirements is proved in [16]. The authors propose a LB algorithm that is acting based on the scheduling mechanism used and the wireless link quality information. The proposed solution is more time effective and can operate in a distributed way. In [17] a new approach is proposed to compute a metric expressing the network load. The new metric computation hides the heterogeneity of network technologies from the LB module and can be applied to any packet injected into the system. In [18] a utility function-based approach, which can support multiple client classes is introduced. A bandwidth sharing policy in heterogeneous networks and a “controlled unfairness” scheme are achieved by using logarithmic utility functions that characterize the bandwidth allocated to different users.
In [19] a Markov decision process is proposed for LB operations in heterogeneous cellular networks using multiple carriers, and the LB solution proposed is based on the usage of the Sarsa algorithm of online learning. The authors of [20] jointly address the network LB and the server LB and propose a two-phase algorithm that concurrently deals with the two LB problems in the context of new network architectures integrating virtualized network functions. In [21] the authors present a LB algorithm that selects a suitable network interface for each data flow in a dynamic way. The paper considers the growing importance and the heterogeneity of Local Area Networks (LAN) and the increasing requirements of the services in terms of latency and throughput. The interface selection is based on service requirements and the LB operations are modeled as a mixed integer linear program.
In [22] the LB technique is proposed to be implemented among collocated BSs for better usage of the transmission resources and increased energy efficiency in the context of sustainable green wireless networks. In [23] the authors propose solutions to solve the problem of resource allocation optimization in heterogeneous 5G networks while satisfying the QoS requirements of the users. A multi-agent system is embedded into the standard cuckoo algorithm and the multi-agent cuckoo algorithm is obtained and used to solve the considered resource allocation problem. In [24] the authors analyze, using computer simulation, different scheduling schemes for radio resources in heterogeneous networks that integrate 5G, 4G, Wi-Fi, and other wireless technologies. The goal of the study is to determine how to improve the throughput in heterogeneous 5G networks.
Game theory and genetic algorithm-based LB mechanisms were also proposed in several papers. In [25] the authors study the bandwidth aggregation on backhaul connections in the context of wireless LANs composed of APs with spare backhaul capacity and APs with a shortage of backhaul capacity. The transfer of transmission capacity between the two categories of backhaul connection is modeled as a matching game with the many-to-one setting. In [26], considering the high demand for computation and communication resources and the heterogeneity of these resources in distributed computer systems, the authors propose a new method for solving the LB problem using game theory and a genetic algorithm. The LB problem is modeled as a non-cooperative game of the system’s users, and a genetic algorithm is used to solve the formulated LB game. In [27] the authors consider the problem of mobile users’ access to cloud services. To ensure high performance and reliability the integration of centralized cloud computing and distributed edge computing is considered. To meet the latency requirements of some computation-intensive applications the authors propose to divert some of the incoming job requests from overloaded cloudlets to under-loaded neighbor cloudlets and this LB process is modeled as a non-cooperative game. The problem of LB in data centers in the context of cloud computing is considered in [28]. The increase in the number of IoT devices and the increasing interest in real-time analytics services could generate significant imbalances in the load of cloud data centers. The paper proposes a Stackelberg (leader-follower) game model for selecting in a balanced way the physical host for executing each task arriving at the data center. A similar problem of LB in data centers in the context of cloud computing is also considered in [29]. The authors propose two solutions for the LB problem, considered a non-cooperative game among users, based on game theory and metaheuristic algorithms. The authors of [30] consider the problem of LB in distributed systems at a more general level. The LB problem defined has two conflicting objectives: minimize the users’ expected response time and minimize the total cost incurred by the users. The authors model the LB problem as a non-cooperative game and propose an algorithm to solve the defined game. Offloading traffic from crowded base stations to APs in a 5G environment is considered in [31]. The authors propose a scheme using game theory and the Stackelberg approach for taking the decisions of traffic offloading of crowded networks. The proposed solution can achieve a more efficient QoS in a networking environment involving various types of data with different QoS requirements. The use of GT concepts in LB algorithms over virtual communications tunnels established between an AP node, which receives the user flows, and an Advanced Gateway node is considered in [32]. The paper proposes several GT-based LB algorithms and compares the performance of these algorithms with that of “classical” LB algorithms, being demonstrated that some of the GT-based algorithms can manage most efficiently the transmission resources available in the virtual communication tunnels. The short state of the art presented above shows the use at large scale of GT-based algorithms in solving various load balancing and traffic offloading problems. This is mainly due to the flexibility of GT in modeling various optimization problems and the ability of this class of algorithms to solve efficiently the mentioned optimization problems.
This paper considers the situation of small cells deployment in an evolved wireless network when due to different technical and economic reasons the backhaul connection of the evolved small cell is implemented using the shared links of the macro cells covering the small cell (i.e., in-band and/or out-band self-backhauling). To provide the backhaul capacity required by the evolved small cell in discussion the aggregation of several macro cell links is considered, a process that requires splitting the traffic over the available links modeled as communication tunnels, which is a resource usage optimization problem, while specific constraints are imposed. Considering the ability of the GT-based algorithms of solving optimization problems the paper proposes several GT-based LB algorithms over the macro cell links providing the backhaul connectivity. The proposed algorithms are adapted to the specific case of LB over virtual communication tunnels with specific definitions of the games and specific QoS parameters which should be ensured. The performance of the proposed GT-based LB algorithms and of some reference LB algorithms are assessed by extensive computer simulations. The obtained results show the superiority of LB algorithms which model the LB process as a multiplayer game based on a sealed-bid auction process compared to non-GT-based algorithms and non-cooperative GT-based algorithms. The paper also considers scenarios when several small cell APs are deployed and proposes GT-based solutions for user clustering, i.e., the selection of the user groups that connect to each AP. The goal is the LB between the deployed APs to ensure the QoS requirements on the AP–user links, and of course to ensure the global end-to-end QoS.

2. Materials and Methods

2.1. Problem Formulation and System Model

The considered networking scenario is presented in Figure 1. The AP of the small cell offers high bit rate communications to its active users, using some access technology such as LTE, WiFi, etc., and connects to the core network using the wireless links of several macro Radio Access Networks (RANs) (LTE, 3G+, WiMAX, 5G, etc.) which cover the area of the small cell.
A particular case is represented by the deployment of a small cell inside a public transportation vehicle (bus, train, etc.) to provide ubiquitous and high bit-rate communications to the passengers and the equipment of the vehicles (video surveillance system, infotainment system, etc.). In this situation, depicted in Figure 2, one of the most cost-effective solutions for providing backhaul connectivity for the AP is to use the wireless links of the macro cells which cover the route of the vehicle as backhaul links. The AP is represented in this case by an Advanced Mobile Router which works together with a dedicated advanced gateway, the Service Continuity Gateway (see Figure 2), to provide ubiquitous connectivity.
A single shared macro cell link might not be able to provide the needed backhaul capacity, at least not in circumstances when the number of small cell users is large and bandwidth-demanding services are accessed. The solution is to use several macro cell links established in different macro cells covering the small cell and aggregate the bandwidth offered by these macro cell links. The problem which must be solved is how to distribute/route in an efficient way the service flows of the users connected to the small cell AP over the macro cells shared links while fulfilling the QoS requirements of the user’s service flows.
The considered system model for the uplink transmission is depicted in Figure 3 and includes the AP node, which receives the services flows, fi, generated by the users, and is connected to an Advanced Gateway node (AG) by several parallel virtual tunnels. Both nodes have LB capabilities over the virtual tunnels connecting them. Such an advanced gateway node could be part of a virtualized infrastructure layer [1,2], and its functionalities can be defined and implemented using SDN technologies [9]. As in most communication systems, e.g., LTE and WiMAX, each duplex communication channel is formed of two independent simplex communication channels. The modeling of the downlink transmission is like that of the uplink transmission, only the direction of the flows is different. Each flow fi, i = 1, …, K, is characterized by a distribution function Γi(t) which describes the packets’ arrival rate, and a function Θi(x) which describes the distribution of the packets’ size, x. The average bit rate R i a v of the i-th flow is given by:
R i a v = Γ i t Θ i x d x d t
It is assumed that there are also several output flows and there is a one-to-one correspondence between the i-th input flow and i-th output flow.

2.1.1. Virtual Tunnel Modeling

Each tunnel between the AP and AGN nodes is modeled as a First-In-First-Out (FIFO) queue with a single server whose service time depends on the instantaneous physical channel conditions in the wireless network where the tunnel is passing. To each tunnel, j, is associated a convex function Tj(nj, Cj(t)), which returns the expected waiting time for a newly arrived packet, if, after queuing the packet there are nj packets waiting in the queue, and the instantaneous capacity of the physical link is Cj(t).
Because the data flow fed to the input of a tunnel is a mixture of different types of traffic, real-time and non-real-time traffic with different packet sizes and packet interarrival times, it can be considered that the packets arrive according to a Poisson process [33]. It should be mentioned that the Poisson traffic model is not the most realistic model for many traffic types, but it is widely accepted and provides mathematical tractability. Some more complex modeling involving a mixture of Poisson distributions is given in [33]. The data packets’ interarrival times on different tunnels are independent random variables exponentially distributed with parameter λ A j [34]. The interarrival time, ν A j , with parameter λ A j has the probability distribution function:
P ν A j = λ A j e λ A j ν A j
The expectation of the number of packets fed to the input of tunnel j is:
E ν A j = λ A j
It is considered that the times necessary to transmit the packets, i.e., the service times on different tunnels, are independent and identically distributed with probability distribution function F B j and probability density f B j . To ensure the stability of the queue the users’ service flows must be combined, i.e., distributed on the available tunnels, so that the occupation rate ρj is less than one [34] on each tunnel.
ρ j = λ A j E B j 1 < 1
where E B j 1 represents the expectation of the packet rate on tunnel j.
The state of the j-th tunnel can be described at a time moment by the tuple (nj, τj) where nj is the number of packets stored in the queue of the tunnel in discussion and τj is the delay experienced by a packet in the transmission chain. The first parameter of the tunnel’s state is discrete, while the second one is continuous, and this could complicate the analysis. However, if we consider only the queuing process of the tunnel, then the tunnel’s state description can be simplified to nj only, τj being 0 for the new packets stored in the queue. We denote by L j , k d the number of packets remaining in the queue after the transmission of the k-th packet, and by d n j the fraction of packets that leave in the queue nj packets after their transmission [34].
d n j = lim k P L j , k d = n j
The number of packets remaining in the queue after the k+1-th packet is sent, L j , k + 1 d , is equal to the number of packets present when the k-th packet was sent minus one plus the number of packets that are stored in the queue during the transmission time of the k+1-th packet, i.e., during the service time of packet k+1. This last number of packets is denoted by A j , k + 1 and we have [34]:
L j , k + 1 d = L j , k d 1 + A j , k + 1 ;   i f   L j , k d > 0 L j , k + 1 d = A j , k + 1 ;   i f   L j , k d = 0
From the equations above result that the sequence L j , k d k = 0 can be represented as a Markov chain, the transition probabilities between the states of this chain being given by:
p i , l = P L j , k + 1 d = l | L j , k d = i
By α n j we denote the probability that during the transmission of a packet exactly nj packets arrive. Considering that during the service time, t, of a packet the number of new packets that are stored in the queue is Poisson distributed with parameter λ A j t we can express α n j as:
α n j = t = 0 λ A j t n j n j ! e λ A j t f B j t d t
The limiting probability d n j , defined according to (5), satisfies the equilibrium equations of the Markov chain attached to the queuing process [34]:
d n j = d n j + 1 α 0 + d n j α 1 + + d 1 α n j + d 0 α n j = = k = 0 n j d n j + 1 k α k + d 0 α n j , n j = 0 , 1 ,
If the queue is in equilibrium the maximum value of nj will be limited because the fraction of the packets leaving behind in the queue nj packets, after their transmission, is decreasing with the value of nj and will approach zero for nj large.
We denote the total time spent in the system by a packet with the random variable S having a probability distribution function F S j and probability density function f S j . It is considered that the system is in equilibrium when a new packet arrives in the queue. The distribution of the number of packets stored in the buffer after the transmission of this (new) packet is equal to { d n j } n j = 0 . Considering a FIFO system we have, similar to Equation (8):
d n j = t = 0 λ A j t n j n j ! e λ A j t f S j t d t
The time spent in the system by a packet (also called sojourn time), is the sum of W (its waiting time in the queue) and B (its transmission time on the channel), where W and B are independent random variables. More precisely a newly arriving packet in the queue first must wait for the service time of the packet that is in the transmission chain (residual service time), and then it continues to wait for the transmission of all packets which were already in the queue on its arrival. Based on PASTA (Poisson Arrivals See Time Averages) the server of the queue is busy on the arrival of a new packet with probability ρj, which in our case is the occupation rate of the tunnel. We denote by the random variable Rj the residual service time, and according to [34] we have the following relation between the waiting time in the queue, service time (transmission time in the tunnel), residual service time, and the number of packets waiting in the queue:
E W j = E n j E B j + ρ j E R j
and according to Little’s law, we have:
E n j = λ A j E W j
and finally, we obtain:
E W j = ρ j E R j 1 ρ j
The value of the mean residual service time may be written in the form [34]:
E R j = E B j 2 2 E B j = σ B j 2 + E B j 2 2 E B j = 1 2 c B 2 + 1 E B j
An important observation resulting from (13) and (14) is that the mean waiting time only depends on the mean and standard deviation of the transmission time random variable and not on the distribution function of this variable. It results that, in practice, it is enough to compute the mean and standard deviation of the service time to estimate the mean waiting time. Based on the previous relations the mean value of the system’s response time (the so-called sojourn time) can be expressed as:
E S j = ρ j 1 ρ j 1 2 c B 2 + 1 E B j + E B j
If the service time has a finite expectation E B j = μ j 1 and a finite standard deviation, σ B j = σ j 1 then the expected sojourn time with Poisson arrivals with rate λj (obeying condition (4)) is the following:
E S j = λ j 1 + σ j 2 μ j 2 2 μ j μ j λ j + 1 μ j

2.1.2. User Clustering in Multi-AP Scenarios

In some circumstances, there could be available several small cells to which the users can connect. For example, several small cells could be deployed in a building, or several APs could be installed in a train to which the users can connect. In this case, the users’ access also should be controlled, i.e., should be identified the user groups/clusters that will connect to each AP. This problem involves several theoretical and practical issues:
  • the user-AP link should fulfill some QoS requirements, and the simplest solution is to connect the user terminal to the closest AP or to the AP with the largest transmission power;
  • the users should connect with higher priority to the AP having more available transmission resources on the communications tunnels established over the cellular wireless links. This is necessary to avoid the overloading of some APs, with effect over the global QoS, and for efficient usage of the resources available on the tunnels;
  • the selection process of the users who connect to one of the APs should avoid the need to install supplementary software modules on the user terminals, which would complicate the control of the users’ access process.
The transmission scenario envisioned is depicted in Figure 4a. All the users are in the coverage area of AP-A and if no other AP is installed all users will connect to this AP. A second AP, AP-B, is installed, the users also being in the coverage area of this AP. The access protocol should select the users which connect to each AP, the selection being a dynamic one based on the transmission power of the APs and the available transmission resources on the communication tunnels used as backhaul connections. The available resources depend on the virtual tunnels’ instantaneous capacities and the instantaneous packet and bit rates of the users’ data flows. This scenario could be extended to more complex ones with more APs. For example, the train deployment scenario could include a third AP, AP-C (see Figure 4b), with only some of the users being located in the overlapping coverage areas, i.e., the AP-A: AP-B respectively the AP-A: AP-C coverage area, while all the users are located in the coverage area of AP-A. The building deployment scenario could include more APs, installed on the same or ifferent floors of the building, and the users located in the overlapping coverage areas of several APs.
The users’ clustering algorithm could be a decentralized one, when no central control unit is employed, or could be a centralized one when an AP Controller module is used. The presence of this module does not raise significant technical issues, the APs being part of an infrastructure network, of a building, or of a vehicle, that could integrate such a control module. The AP Controller module also could be one of the APs acting as a master.
It should be noted that, if several APs are used the available communication tunnels will be divided between the APs, each AP selecting several users that can be served with the resources available on the allocated virtual tunnels. The number of communication tunnels is fixed, the tunnels being leased from the macro cell operators by the train or building operator, and this fixed number of tunnels should be divided between the installed APs, the users being also split between the installed APs.

2.2. Modeling the Load Balancing on a Set of Tunnels as a Multiplayer Game

We consider that our communication system must transmit K input flows and there are available N tunnels. We denote by s = K 1 , K 2 , , K N the surjective mapping of the K flows on the tunnels. Kj denotes the set of input flows mapped to tunnel j, and we have the conditions: K 1 K 2 K N = K and K i K j = ;   i j . We denote by S the set of all flow-tunnel mapping possibilities and the system response function r : S ;   s S gives the system’s efficiency if mapping s is used. The objective of the LB algorithm is to identify a mapping that maximizes the system efficiency [35], which can be defined as:
a r g s max r s : = s | x S : r x r s
The LB problem defined above can be modeled as a game in which players are agents representing the flows and the tunnels [36]. The strategies of the flow agents consist of the selection of the tunnels established through the heterogeneous network. The objectives of the flow agents are the maximization of the flows’ throughput which is equivalent with the minimization of the delay suffered in the system by the packets of the flows (private objective). The strategies of the tunnel agents consist of the selection of a mapping s, so that the total rate of the flows mapped on a tunnel should be equal to or less than the instantaneous capacity C i t of the tunnel represented by the agent.

2.2.1. Selfish Routing Load Balancing

In this game, each flow agent chooses the route (tunnel) which minimizes the transit time of the flows’ packets (private objective of the game). The social goal of the game is to find an arrangement which minimizes the average delay. Following [37], the notion of “selfishly defined traffic flow” is formalized in the next theorem. In this case, it is expected that each packet of a flow is transmitted along the path inserting the minimum latency, the latency being measured with respect to the rest of the flow’s packets. If this condition can’t be fulfilled for some packets, those packets will be routed on the path with the smallest possible delay. The latency T j f i introduced by the tunnel Tj on the packets of flow fi, i.e., f i K j , is defined by the sojourn time.
Theorem 1.
A flow fi in a graph G representing the network is at Nash equilibrium if and only if for every i { 1 , , K } f i K j T j f i T z f i ;   z { 1 , , N } , z j .
Briefly, Theorem 1 state that, in a flow at Nash equilibrium, all packets travel on the minimum latency paths. If fi is at Nash equilibrium, then all flows mapped to that tunnel have equal latency let say L j K j . Therefore, the social cost C s of an arrangement can be expressed as [36]:
C s = j = 1 N L j K j λ j
where λj denotes the average packet rate through tunnel j.
If the stability condition is fulfilled (i.e., the global input rate is less than or equal to the total capacity of the tunnels) the Nash equilibrium always exists and is inherently unique.
Definition of the game:
  • the f i ,   i { 1 , K } flow-agents, i.e., the players;
  • A i = { T 1 , , T N } is the finite set of the actions of player i, i.e., each player (flow) should choose one tunnel. It is defined an action profile a = ( a 1 , a 2 , , a K ) , where each element ai of the vector represents one action for each player of the game, and this profile corresponds to an arrangement s;
  • the payoff or the utility function ui of a player (flow) in this case is u i = T j f i , i.e., the expected latency if the agent i chooses tunnel j.
.
Algorithm 1 presented below gives the operations involved by the Selfish Routing LB algorithm.
Algorithm 1 Selfish Routing-based LB algorithm
Compute the expected latency for each packet of the flow fi on every tunnel.
1: for j = 1 to N do
2:             compute T j f i based on (16).
3: end for
Select for flow fi the tunnel which ensures the minimum latency.
4 :   z = arg min j = 1 , , N T j f i
Associate flow fi to tunnel z.
5:   K z = K z f i
6: Generate the signaling traffic for flow routing and send it on default tunnel j = 1
In the previous sections it was mentioned that the mixture of flows applied to each tunnel is supposed to be Poisson distributed, and in consequence the packets interarrival times are exponentially distributed with parameter λ A j . This parameter is necessary to estimate the expected latency T j f i on each tunnel. The λ A j parameter can be obtained by fitting the measured distribution of the interpacket delays with the pdf curve of the exponential distribution. By using the method of moments results 1 / λ A j = m e a n ( Δ p j ) , where Δpj are the packets interarrival times of the flow mix applied to tunnel j. In this simple case, we have only one parameter of the distribution which should be computed.
Even if this algorithm has low complexity, O N , the social cost of the Nash equilibrium (NE) is worse than the optimal solution, i.e., due to the lack of coordination among the players the solution obtained at Nash Equilibrium is not the optimal one, and the cost of this lack of coordination between players is called the price of anarchy and is defined as [37]:
max N E C N E C o p t = price   of   anarchy
Using a set of N tunnels with an expected total transfer rate at least μmin, the price of anarchy for situations when the latency functions are defined by (16) and the sum of all flow rates transmitted over each tunnel is at most R m a x μ m i n , is given by [38]:
max N E = sup j 1 , , N 1 + μ j μ j R max 2 μ j + R max σ j 2 μ j 2 1 4 μ j + μ j + R max μ j μ j R max σ j 2 μ j 2 1
where μj and σj denotes the expectation respectively the standard deviation of the packet transfer rate distribution associated with tunnel j.
The algorithm involves a high signaling overhead required to change the tunnel associated with the flow, change of tunnel which could happen with each new packet arriving at the AP. To reduce the amount of computation and signaling required by the algorithm a timer can be defined for each flow, and the algorithm is executed only when the timer expires and not when a new packet arrives at the AP node. The LB solution remains unchanged until the timer expires, i.e., during the timer period. Changing the tunnel at each packet could generate a large amount of jitter which might not be compensated by the buffering operations performed at the receiver. The amount of jitter generated will be reduced if the algorithm is executed only when a timer expires.

2.2.2. Auction-Based Load Balancing

To describe the LB process as a first price sealed-bid auction [39], the LB module could be considered a contractor who has K = | K | goods (the K flows) to deliver and let the N tunnel agents represent the N available deliverers. Each tunnel agent j submits simultaneous “sealed bids” b j f i which represent the price for transferring the packets of flow fi, the bidder with the lowest offer wins the contract for transferring flow fi, and the LB module pays the price for the transfer of the flow fi. The goal of the tunnel agents is to maximize their payoff represented by the difference between the price paid by the LB module, b j f i , and the true cost of transferring the flow fi through the tunnel j, denoted by v j f i . If b j f i is not the winning bid, then the payoff to tunnel agent j is 0. If b j f i is the winning bid, then the payoff to tunnel agent j is b j f i v j f i . It can be noticed that the true-value bidding in this game cannot be the dominant strategy. By bidding for the true value, a bidder receives a payoff of 0 if it loses and it will also receive a payoff of 0 if it wins, since he receives the same value as its costs. As a result, the optimal way to bid in the first price auction is to “shade” the bid slightly upward, so that if a bidder wins, it receives a positive payoff. Finding out how much to increase the bid involves a trade-off between two opposite forces. If the bid is close to the true value, then the payoff will be small if the bidder wins. However, if the asked price is too large compared to the true costs, this increases the potential payoff of the bidder in the event of winning, but it reduces the chance of being the lowest bid and in consequence the chance of winning. Finding the optimal value of the bid is a complex problem that depends on the knowledge of the other bidders and their way of acting.
In the case of our optimization problem, we consider that the real cost of carrying the flow fi through the tunnel j would be:
v j f i = L j K j f i λ j + λ i
which represents the expected latency (relative to the interpacket delay) inserted by tunnel j if it wins the delivery contract of flow i. The submitted bid is proportional to the communication resources, i.e., the bandwidth used to ensure the requested delays when the packet rates have some values, and the used bandwidth can be considered the cost necessary to carry the packets.
For simplicity it can be considered that the submitted bid by the tunnel is:
b j f i = L j K j f i λ j + λ i + n j + Δ i , j = v j f i + n j + Δ i , j
It can be noticed that the bid submitted by the agent j, is shaded by the number of packets waiting in the queue nj, while Δ i , j j represents the amount of penalty which the contractor (the LB module) must pay if it changes the beneficiary of a contract:
Δ i , j = n i z j ; f i K j 0 ; f i K j
where n i z j represents the amount of signaling traffic (number of signaling packets) required to move the flow i from the tunnel z to tunnel j.
The number of packets waiting in the queue nj will influence the evolution of the delay in the next time periods, and to keep the desired value of the delay it is possible to be needed more bandwidth if nj increases, i.e., the cost for carrying the packets is influenced by nj.
Algorithm 2 presented below gives the operations involved by the Auction-Based LB mechanism.
Algorithm 2 Auction-based load-balancing algorithm
Each new traffic initially is associated with default tunnel j = 1.
At each arriving packet
1: for j = 1 to N do
2:             estimate v j f i based on (21).
3:            compute b j f i based on (22) and (23).
4: end for
Select for flow fi the tunnel which submitted the lowest bid.
5:  z = arg min j = 1 , , N b j f i
Associate flow i to tunnel z 
6:  K z = K z f i
Update the tunnel total revenue after sending the packet.
The difference between this algorithm and the previous one is that here all packets belonging to one flow are carried by the winning tunnel. A flow remains attached to a tunnel until its global quality degrades so much that it is more beneficial to that flow to change the tunnel (even “paying” the penalty). The algorithm’s complexity is O N for each arriving packet. As in the situation of the Selfish Routing LB algorithm, the amount of computation required can be decreased by defining some timers attached to each flow and executing the algorithm only when the timer expires and not for each new packet arriving at the AP. The downside of such a solution is the slower response of the system to the changes in the input parameters.

2.2.3. Combinatorial Auction-Based Load Balancing

It is considered that the contractor from the previous algorithm could receive quotes for one single flow at a time. However, this may not be very effective because the auction should be repeated with each arriving packet. The combinatorial auction allows players to bid on a subset K z K . These are most useful if there are compliments, i.e., a set of items might be worth more than the sum of the parts [37]. In this case, the bidders submit bids b j K z on each K z K . The auctioneer chooses an allocation s = K 1 * , K 2 * , , K N * that minimizes j = 1 N b j K j over all feasible allocations. Considering all possible arrangements each player submits an exponential number of bids, and the allocation problem becomes NP-hard [36].
To reduce the dimension of the optimization space, the flow agents are endorsed with a potential function ϕi. These potential functions describe the time evolution of the beneficiary’s satisfaction with the deliverer [40], i.e., the variation in time of the key performance indicators (bit rate and latency) of the flows. If the potential functions of the flows mapped on a tunnel decrease, the contractor decides to revise the contracts for that tunnel. It generates a set of allocations redistributing a subset of the flows mapped on that tunnel. Considering that the tunnel agents are single-minded bidders, i.e., player j only cares about one subset Kj, the computation complexity is reduced to polynomial time.
In the case of delay-sensitive flows, the time spent by a packet in the transmission chain is the primary parameter that influences the QoS of the transmission. In this case, the potential function should express the delays experienced by the packets of the flow and the degree of user satisfaction in the condition of the experienced delays, which decreases rapidly as the delay is increasing. Denoting by τi the maximum value of the expected delay, we define the utility function for the delay-sensitive data streams as:
ϕ i = 10 τ i c i
where ci is a constant value associated with each flow which allows differentiating the same type of real-time service flows. The maximum value of the proposed utility function is one. Figure 5a presents the variation of the utility function given in (24) with the delay inserted by the tunnel when the coefficient ci has different values. The used potential function allows a good separation between real-time flows with different maximum delay constraints.
For non-real-time traffic the main parameter of interest is the average throughput. The experienced delay, and the possible variations of this delay, have significantly lower importance, even if the delay inserted by the transmission chain cannot be neglected. The proposed potential function expresses the satisfaction of the user according to the Average Call Throughput associated with the flow and the target is, of course, the maximization of the user’s satisfaction. The Average Call Throughput Ri can be defined as the total number of transmitted bits divided by the duration of the transmission process. Let R i c a l l denote the number of bits sent by the user generating flow i during the current call and t i c a l l the time elapsed from the beginning of the current call. If the number of bits that can be transferred through the tunnel j in a single time unit (for ex. one millisecond) is Lj, the instantaneous value of the average call throughput, computed on a finite length window, will be:
R i = R i c a l l + L j t i c a l l
The Lj parameter results from the instantaneous capacity of the wireless link Cj(t).
We define the potential function associated with the delay tolerant traffic as:
ϕ i = tanh R i R i a v = e 2 R i R i a v 1 e 2 R i R i a v + 1
where R i a v is the expected value of the average bit rate and can be computed according to (1). This parameter allows the differentiation between different non-real-time flows. The maximum value of this potential function is also 1. The potential function was defined in such a way as to express user satisfaction with the increasing values of the throughput. Figure 5b shows the variation of the proposed utility function with the instantaneous bit rate, Lj, when the expected average bit rate R i a v has different values. The hyperbolic tangent function is a good choice for representing the progressive transition between two extreme states in our situation: not satisfied at all and totally satisfied with the throughput provided by the system. It also allows a good separation between non-real-time services with different average rate constraints. The operations involved by the Combinatorial Auction-Based LB mechanism are described in Algorithm 3, presented below.
.
Algorithm 3 Combinatorial Auction-based load-balancing algorithm
  Each new traffic initially is associated with default tunnel j = 1.
  At each arriving packet update the flows’ potential function ϕ f i .
  In each moment m T ;   m = 0 ,   1 ,   2 , ; T–interpacket delay or timer period, perform the following steps:
  1: for j = 1 to N do
  2:           compute Φ j m = f i K j ϕ f i K j
  3:            compute Δ Φ j m = Φ j m Φ j m 1
  4:            while Δ Φ j m < i m p o s e d   t r e s h o l d do // the QoS decreases considerably
  Select the flow with the lowest potential.
  5:           i = arg min f i K j ϕ f i
  Create a new arrangement:
  6:            s = K 1 f i , K 2 f i , , K j f i , , K N f i
  7:                  each bidder z j   submits   a   bid   b z K z for the new subset Kz
  Route flow fi through the tunnel which submitted the lowest bid.
  8:           t = arg min z = 1 , , N z j b z K z
  Associate flow i to tunnel t.
  9:            K t = K t f i
  10:           recompute Φ j m = f i K j ϕ f i K j
  11:           recompute Δ Φ j m = Φ j m Φ j m 1
  12:            end while
  13: end for

2.3. Reference Load-Balancing Algorithms

To assess the performances of the proposed GT-based LB algorithms two simpler and less complex algorithms were considered as references.

2.3.1. The Round Robin Reference Load-Balancing Algorithm

This algorithm represents the simplest scheduling algorithm used in packet switched networks. In this case, it was converted into a LB algorithm over parallel tunnels as it is described below by Algorithm 4.
Algorithm 4 Round Robin Load-Balancing Algorithm
Each new data flow initially is associated with default tunnel j = 1
1: if fi is a new flow
2: identify the last used tunnel zN
3: select the next tunnel: z = z + 1 mod N and send flow fi on tunnel z
4: end if
This algorithm does not consider either the capacity of the tunnels or the characteristics of the flows, i.e., type of flow, bit rate, etc. The transfer rate on a given tunnel necessary to transmit all the packets routed on that tunnel could be significantly larger than the capacity of the tunnel, which will have consequently low performance.

2.3.2. The Multiple Knapsack Reference Load-Balancing Algorithm

The Multiple Knapsack algorithm tries to distribute a set of items on a set of containers, called knapsacks. Each knapsack is characterized by its capacity, and the knapsacks represent the tunnels in our scenario. Each item is characterized by a weight parameter and a value or utility. The items are representing in our scenario the flows, characterized by an average rate (weight) and a priority (utility). The algorithm tries to distribute the items on the knapsacks in such a way as to maximize the total utility while fulfilling the capacity limitations of the knapsacks [41,42].
The variant of this algorithm which was implemented and simulated is described by Algorithm 5 blows
Algorithm 5 Multiple Knapsack load-balancing algorithm
Each new data flow initially is associated with default tunnel j = 1.
1: do
2: compute the priority of the new data flows.
3: sort the flows in descending order of their priorities.
4:           if flows f 1 ,   f 2 ,     f k have the same priority
5:                 sort flows f 1 ,   f 2 ,     f k in ascending order of their average bit rate.
6:            end if
7: route the sorted flows on the available tunnels while fulfilling the conditions:
           a. the sum rate of the flows routed on a tunnel is lower than the average capacity of the tunnel and
           b. the sum of the priority of the flows routed through a tunnel is as high as possible.
8:       while each flow is associated with a tunnel, or no tunnels are available
9:                 if flow fi does not fit on one of the tunnels
10:                      check if it fits into one of the other available tunnels.
11:                  end if
12:                  if flow fi cannot be routed over either of the tunnels
13:                      flow fi will be routed over the default tunnel or will be rejected.
14:                  end if
15:       end while
16: end do
In what concerns the priorities of the flows, five classes were considered: class 1-gaming, video conferences, class 2-video streaming, class 3-voice over IP, class 4-web browsing using HTTP, and class 5-best effort FTP. In a simpler approach, the flows can be classified into only two classes, i.e., real-time with high priority and non-real-time with low priority. This algorithm works at flow level (not at packet level), and it is executed when a new flow is generated, or when a predefined timer expires, or the parameters of the networks (e.g., the quality of the wireless links) change significantly.

2.4. Modeling the User Clustering Process as a Game

The user clustering problem aims to associate each user terminal to one and only one AP in such a way as to maximize the use of the available resources while fulfilling the flows’ end-to-end QoS requirement. For this, each user should be connected to the nearest AP (to maximize the user-AP link’s quality), and the difference between the load and capacity of the APs should be minimized. To model the clustering problem, let’s denote by D i t the demand formulated by the user i, and by C j t the sum of the capacity of the tunnels starting from APs j. Let xi,j be a binary variable which is xi,j = 1 if the user i is connected to APs j and 0 otherwise, then the load L j t of the j-th AP is:
L j t = i x i , j D i t   j
The clustering problem can be formulated as a liner programming problem in the following way:
min j j y j L j t C j t min j i j x i , j d i , j   s . t . j x i , j = 0   i x i , j ,   y j 0 , 1
where yj = 1 if L j t > C j t and 0 otherwise and di,j is the distance between the i-th user terminal and the j-th AP.
To solve the user clustering problem a simple non-cooperative and a cooperative game is proposed. In each case, the AP is represented by a “user broker” (player) api, which allows more users to connect to the AP if the AP’s load is less than the instantaneous capacity. In the non-cooperative game, each AP agent chooses the action that minimizes the gap between the load and backhaul capacity of the represented AP.
Definition of the game:
  • the api, i∈{1, …, K} AP agents are the players;
  • Ai = {P1, …, PN} is the finite set of the actions of player i, i.e., each player should choose a transmit power that influences the user terminals to connect or not to the specific AP. It is defined an action profile a = (a1, a2, …,aK), where each element ai of the vector represents one action for each player of the game, and each action profile corresponds to an arrangement s of APs and users.
  • the payoff or the utility function ui of a player in this case is u i = C i t L i t , i.e., the expected difference between the load and the capacity of APi.
The steps necessary to implement the non cooperative clustering process are described by Algorithm 6.
Algorithm 6 Non cooperative user clustering mechanism
  estimate the difference between the demand and capacity for each AP.
  1: for j = 1 to N do
  2:            estimate C i t L i t using the average packet delay or the lengths of the transmit queues.
  Check if the AP has free capacity.
  3:            if C i t L i t > 0
  Increase the transmit power of APi and by this increase the coverage area and the number of users connected to APi.
  4:            else
  Reduce the transmit power of APi and by this reduce the coverage area and the number of users connected to APi.
  5:            end if
  6: end for
  7: Each user checks the strengths of the received signal from each AP and chooses the AP from which the received signal has the highest power.
In the case of the cooperative game each AP agent, api, collaborates with the agents of the neighboring APs to choose the strategy that might minimize the gap between their load and the backhaul capacity.
Definition of the game:
  • the api, i∈{1,…,K} AP agents are the players;
  • A i , j = P 1 , P 1 , P 1 , P 2 , , P N , P N is the finite set of the actions of the tuple of players (api, apj), i.e., each group of neighbor player should adjust their transmit power that influences the user terminals to connect or not to the specific AP. An action profile a = (a1, a2, …,aK) is defined, where each element ai of the vector represents one action for each tuple of players, and each action profile corresponds to an arrangement s of APs and users;
  • the payoff or the utility function ui,j of a group of players in this case is u i , j = L i t C i t + L j t C j t , i.e., the expected difference between the total load and the sum of APs’ capacity.
The steps necessary to implement the cooperative clustering process are described by Algorithm 7.
Algorithm 7 Cooperative user clustering mechanism
  estimate the difference between the demand and capacity for each group of two neighbor Aps.
  1: for i = 1 to N do
  2:             for j = i+1 to N do
  3:            estimate L i t C i t C i t and L j t C j t C j t using the average packet delay or the lengths of the transmit queues.
  Check if the APs are load balanced.
  4:            if L i t C i t C i t > L j t C j t C j t .
  Increase the transmit power Pi of APi and decrease the transmit power Pj of APj.
  5:                else
  Decrease the transmit power Pi of APi and increase the transmit power Pj of APj.
  6:                end if
  7:             end for j
  8: end for i
  9: Each user checks the strengths of the received signal from each AP and chooses the AP from which the received signal has the highest power.

3. Results

3.1. The Architecture of the Simulation Platform Used for the Evaluation of the LB Algorithms

The architecture of the simulation platform used to assess the performance of the proposed LB algorithms is depicted in Figure 6.
The Traffic Generator module generates the data flows for each user according to the specified traffic mixture and statistical characterization of each traffic type [43]. The generated data flows are routed through the tunnels based on the decisions taken by the LB module. The Wireless Channel Simulator module simulates the wireless links instantiated in the cellular networks according to the considered channel models. To each simulated wireless link a Channel Estimator module is associated, these modules perform a short-term prediction of the channel parameters based on the latest simulated/computed values. In this way, it is possible to make a short-term prediction of the tunnels’ instantaneous capacity. The LB module receives the statistical data characterizing the generated data flows, the Queue State Information (QSI) associated with each tunnel, and the Channel State Information (CSI) generated by the Wireless Channel Simulator module. Using all this information, for each input flow, the LB module tries to choose the tunnel which ensures the smallest delay accumulated through the system. At the output of the tunnels, the accumulated delay and other performance indicators are evaluated for each packet, and statistical data are collected for each flow. These results together with the data describing the status of the system can be stored in a database for further evaluation. The following subsections describe each constituent block and the considered algorithms.

3.1.1. The Traffic Generator Module

This module generates the data packets which constitute the input traffic for the simulation chain. The packets are generated based on statistical models used for system level evaluation of the cellular wireless systems [43,44,45]. The traffic types considered are: Best Effort Traffic (FTP), Interactive Traffic (Web-browsing using HTTP), VoIP, Video Streaming, and Interactive Real-Time Services (Gaming). All the traffic flows are generated according to the specifications of [43,44,45], the most relevant parameters being considered for each traffic flow. See Appendix A for the mathematical modeling of the mentioned traffic types.

3.1.2. The Wireless Channel Simulator Module

The cellular network scenario considered in the design of the wireless channel simulator is presented in Figure 1. The scenario is a realistic one that supposes the overlapping of the coverage area of several base stations using the same or different wireless access technologies. A device, i.e., a mobile router or a mobile AP, equipped with N cellular network interfaces is moving in an area covered by N independent wireless networks. The device follows a random walk motion pattern, and when the device arrives at the border of the cell, the position of the new serving base station is generated randomly so that the radius of the cells follows a Gaussian distribution with predefined parameters. In this case, we obtain a realistic network topology where the position of the base stations differs from one operator to another as well as the size of the cells the user passes through while moving on his route. It is also assumed that all networks serving the device have approximately the same load, which is less than their capacity, and each network uses a proportional fair radio resource management algorithm. In this case, the average transfer rate obtained by the device is highly related to the radio channel characteristics experienced by that device. In this simulator, it is considered that the instantaneous transfer rate is proportional with the effective instantaneous Signal to Noise Ratio (SNR) observed at the input of the considered receiver. The considered effective SNR–transfer rate mapping model is depicted in Figure 7. A modified ITU Vehicular B [46] channel model was considered, with mean mutual information per coded bit (MMIB)-based link to the system mapping technique.
As an example, a particular situation regarding the capacity variation of the virtual tunnels established between the AP and the four base stations depicted in Figure 1 is presented in Figure 8. In Table 1 are presented the max./min. values and the mean, median, and standard deviation values of the transfer rates of the 4 considered tunnels. Can be noticed that some of the tunnels provide relatively constant transfer rates (tunnels 2 and 4), while on other tunnels the transfer rates variers significantly in time (tunnels 1 and 3).

3.2. The Architecture of the Simulation Platform Used for the Evaluation of the User Clustering Algorithms

To test the proposed user clustering algorithms another simulation platform, depicted in Figure 9, was developed. The integration of the users’ clustering algorithms in the complex simulation platform used for the evaluation of the presented LB algorithms is relatively difficult to perform. The developed platform includes the data flows generation module (User Cluster Traffic Generator), based on the considered traffic models (see Table A1, Table A2, Table A3, Table A4 and Table A5) and traffic mixture specified in Table 2. To simplify the simulation a single output tunnel is considered, and this could be an aggregated tunnel. This aggregated tunnel is simulated by the Wireless Channel Simulator module. An AP Controller module is integrated into the simulation platform. This module receives the aggregated tunnel queues’ status information and the data flows’ characteristics and controls the transmission power of the APs according to the used clustering algorithm. Based on the selected transmission power the user clusters connected to different APs are generated, more users connecting to the APs with larger power. This approach has the target to simplify the users’ access to the APs, only the power of the APs being manipulated. The APs with more available resources increase their transmission power on the AP-user links, while the APs with fewer available resources maintain or reduce their transmission power. AP selection or handover based on the received power level is one of the most common and simplest ways of selecting an attachment point to a wireless network and this solution is used on large scale also in cellular networks.
The users are randomly distributed between the deployed APs and the distances between the users and each AP are computed. Based on the distances the attenuation on the user-AP links and the power received by the users are computed according to Equation (29).
a u s e r A P d d B = a s d 0 d B + 10 n lg d d 0 a s d 0 = 4 π d 0 λ 2 P u s e r = P A P a u s e r A P
where d0 is the reference distance and is considered 1 m (it depends on the size of the cell), n gives the slope of the attenuation characteristic and is considered 2.5, but it depends on the simulated wireless propagation scenario and λ is the wavelength–the carrier frequency was considered 2.4 GHz.
The estimation of the transmission resources available on the virtual tunnels can be made based on the sojourn time S, i.e., the delays suffered by the source data packets in the transmission system. To take into account the variation of the sojourn time on a larger time scale, a moving average is computed on each tunnel considering a large number of packets N, i.e., several thousands of packets:
S a v _ i = S i + N S a v _ i 1 N + 1
where Sav_i is the average delay at moment i.
Other indicators related to the available resources in the system are the number of packets stored in each buffer and the number of bytes (or bits) stored in the same buffers. These parameters combined with the sojourn time could give a more detailed picture of the available resources and allow a better clustering of the users.
The clustering process of the users should be performed with a relatively low frequency to avoid frequent disconnection and reconnection of the users (the so-called ‘ping-pong’ effect) which could generate interruption in the transmission process and increase the signaling overhead. However, at the same time the clustering process should be performed frequently enough to take into account the variability of the capacities of the tunnels and the users’ data flows rates. In the simulations performed the clustering process was performed at a time interval of tens of seconds, but less than 1 min. The signaling overhead on the user-AP link was not considered.

3.3. Simulation Results and Discussions

3.3.1. Evaluation of the Proposed LB Algorithm over Parallel Virtual Tunnels

Four tunnels are set up in four different cellular networks in the evaluation scenario considered (see Figure 1), and 50 data flows are generated by the users connected to the small cell AP. We consider that the cellular networks belong to different operators, and they are independent and assign uncorrelated transfer rates to the tunnels. The considered channel and shadowing model is the urban environment model defined in [46]. The considered traffic mixture [44] of the data flows is defined in Table 2. The performance indicator which is monitored is the evolution in time of the delays suffered by the packets of the transmitted flows when different LB algorithms are used, i.e., the proposed LB algorithms and the considered reference LB algorithms. The used traffic mixture is a relevant and balanced one with 50% percent real-time traffic and 50% best effort traffic. A high percentage of real-time traffic will not be relevant for the assessment of the developed LB algorithm due to the relatively low bit rates of these traffic types, which will generate an underuse of the tunnels’ transfer capacities and the delay requirements will be fulfilled without any problems. A high percentage of best effort traffic, with a relatively large expected average rate R i a v , will generate an overload of the tunnels and an increase in the delays inserted by the transmission system, no matter which LB algorithm is used.
Figure 10 presents the Probability Density Functions (pdf) (Figure 10a) and the Cumulative Density Functions (cdf) (Figure 10b) of the delays suffered by the transmitted packets in the simulated transmission system when the proposed, GT-based LB algorithms, respectively when the reference LB algorithms are used.
As expected, the delays experienced by the transmitted packets are the largest in the case of the Round Robin LB algorithm. This algorithm does not consider the statistics of the data flows and the quality of the transmission links over which the tunnels are instantiated. Due to this, the requested transfer rate on a given tunnel could become larger than the instantaneous capacity with a high probability, and this will lead to large delays of the packets waiting in the queues.
Using the Selfish Routing LB algorithm each packet should choose a tunnel where the expected delay is minimal but the frequent tunnel changes generate a high amount of signaling traffic. In this case, the number of the generated signaling packets was comparable with the number of payload packets, and this high overhead overloads the tunnels leading to significant delays. In the scenario when the signaling overhead is neglected (or at least significantly reduced) the experienced packet delays are much lower than in the previous case when the signaling overhead is considered. Even in this case, the social cost of the Nash equilibrium is higher than that of the optimal solution due to the lack of coordination (the price of anarchy). This loss in performance relative to the optimal solution is because in each time instance more packets could choose a given tunnel where apparently the delay conditions are the best, overloading the tunnel, thus generating temporary congestion on it, while other tunnels have free capacity. Reducing the signaling overhead can be achieved by routing several consecutive packets on the same tunnel, i.e., dealing with flows instead of individual packets.
The Auction-based LB algorithms ensure the best performance because they dynamically adapt the traffic on the tunnels according to the changes in the transmission links parameters. The Combinatorial Auction based LB algorithm over-performs the other considered algorithms because it permanently monitors the QoS performance and the system’s changes, and it maximizes both the user’s and the system’s revenue (measured by the level of satisfaction or the cost function). The Auction-based LB algorithm also has good performance, the difference between the two GT-based algorithms not being significant, at least at low packet delays.
The reference Multiple Knapsack algorithm has lower performance than the auction-based algorithms and ensures comparable performance with the ideal Selfish Routing LB algorithm with no or low overhead.
Figure 11 presents separately the pdfs and the cdfs of the delays suffered by the transmitted packets in the simulated transmission system when the Auction-based LB algorithm, the Combinatorial Auction-based LB algorithm and the Selfish Routing LB algorithm with no penalty are used, respectively when the reference Multiple Knapsack LB algorithm is used (these are the best algorithms identified in Figure 10). The presented results show clearly that the Combinatorial Auction algorithm has the best performance, i.e., it inserts the smallest delays with the highest probabilities, and the Auction-based LB algorithm also has good performance. Both algorithms have significantly better performance, i.e., smaller delays with higher probabilities and larger delays with lower probabilities, compared to the Multiple Knapsack algorithm and the Selfish Routing LB algorithm with no signaling penalty. Even if all algorithms have polynomial complexity, the highest processing resources are requested by the Combinatorial Auction-based algorithm followed by the Multiple Knapsack and the Auction-based LB algorithms. The Combinatorial Auction-based algorithm has the highest computational complexity due to the continuous monitoring of the potential functions and the instantaneous call throughput, while the other two algorithms (mentioned above) must evaluate only the instantaneous call throughput.
Another important issue that must be considered is how well can handle the proposed and tested LB algorithms the real-time flows. The distributions of the packet delays presented in Figure 10 and Figure 11 do not make any difference between the different traffic types, being characterized the entire traffic mix. In the case of the real-time type data flows (see Appendix A) the interpacket delays are typically situated between 0 and 40–60 ms. In the case of VoIP flows the interpacket delay is 20 ms, the maximum allowed value of interpacket delays for video traffic is 12.5 ms and for gaming the interpacket delays are requested to be smaller than 40 ms, a 60 ms delay being considered an outage. The values of the packet delay cdfs of the algorithms considered in Figure 11 are presented in Table 3, for a better comparison of these values.
The results presented in Table 3 show clearly that only the Combinatorial Auction-based LB algorithm can ensure with high probability (in the considered scenario) the delays requested by the considered real-time applications. The Combinatorial Auction-based LB algorithm computes the potential functions for each traffic flow and checks continuously if the QoS parameters can be ensured on each tunnel and if not, the data flows are redistributed. The Selfish Routing and the Auction-based LB algorithms do not consider separately the different types of flows and do not check the fulfillment of the QoS requirements after the routing decision is taken. The Multiple Knapsack LB algorithm assigns different priorities for different types of flows and routes first the flows with higher priority, but it takes the routing decisions only based on average flow rates and average tunnel capacities. The results presented in Figure 8 and Table 1 show that the wireless tunnels’ capacities could change significantly in time having as consequence the possible (significant) increase of the sojourn time.
The results presented above are valid in the situation when the total transfer rate of the users’ flows is less than the total capacity of the communication tunnels, but the difference between the requested rate and the offered capacity is relatively small when it is important to fill each tunnel as close to capacity as possible. The selected flow mixture represents such a situation. If this difference is large, it does not matter which LB algorithm is used, the tunnels being capable of accommodating the source flows.
The analysis presented above shows that if the tunnels are congested and real-time applications are used by many users the Combinatorial Auction algorithm is the best solution, this algorithm being capable to fulfill with high probability the latency requirements of real-time applications. If the level of congestion on the tunnels is reduced the simple Auction-based algorithm is the best choice having better performance than the Multiple Knapsack algorithm but lower implementation complexity. Due to the lack of control, the Selfish Routing algorithm is not a practical option, the Multiple Knapsack algorithm being the best solution if the auction-based GT algorithms cannot be used.
Figure 12 presents the price of anarchy, maxNE (20), for the four tunnels considered in the performed experiment. Figure 12a presents the evolution of the price of the anarchy with the absolute value of the total rate Rmax < Rav-tunnel, for each tunnel, while in Figure 12b the variation of the price of anarchy with the relative value of the total rate Rmax/Rav-tunnel is presented.
The price of anarchy increases abruptly when the total rate Rmax approaches the average transfer rate of the tunnel, but for values of Rmax smaller than Rav-tunnel the variation of the price of anarchy is relatively slow with the increase of Rmax (see Figure 12a). Furthermore, we can see that as the total rate Rmax approaches the Rav-tunnel value of the tunnel transfer rate significant gains in system transfer rate can be obtained by using more efficient LB algorithms than the relatively simple selfish routing.
If we compare the variation of the price of anarchy for the considered tunnels with the values of the Rmax/Rav-tunnel ratio (the relative total rate) results that the variation of the price of anarchy has (approximately) the same behavior no matter the average rate/std rate ratio, Rav-tunnel/Rstd-tunnel, of the tunnel (see Figure 12b).

3.3.2. Practical Implementation Issues

The proposed and discussed GT-based and reference LB algorithms act on packet/flow level which makes possible a network layer implementation. This is a significantly simpler solution than a MAC/Physical layer implementation, even if the latter one has the potential of a more efficient implementation. To implement the LB algorithms at the network layer access is required to various packet queues embedded in the Operating System (OS) kernel. Packet queues are basic components of any network stack. Queues allow communication between asynchronous modules, and can increase the performance of inter-module communication, but have the side effect of impacting latency. In Figure 13 is depicted the enqueuing of the IP packets on the transmit path of the Linux OS network stack, being highlighted also some of the used latency-reducing features [47].
Between the IP stack and the Network Interface Controller (NIC) is located the NIC’s driver queue (see Figure 13), typically implemented as a FIFO buffer. The driver queue does not necessarily store the packet data. An alternative is to store some descriptors that point to other packet queues called socket kernel buffers (SKBs), where the packets of the service flows are stored. The NIC’s driver queue acquires packets from the IP stack. These packets may be generated locally by various services running on the platform or may be received on one NIC and routed to another one when the device is functioning as an IP router. The use of the driver queue ensures that if the system has data packets to transmit these packets will be sent on the channel at the moment when the NIC becomes ready for transmission. By employing this design, the NIC does not have to ask the IP stack for data packets when transmission opportunities occur, resulting in a higher transfer rate.
The discussed LB algorithms could be integrated into the Queuing Discipline module, which sets the order in which different services can access the driver queues of the NIC. The Queuing Discipline module has access to the IP stack queues and can acquire information about the data flows. This module also has access to the NIC’s driver queues and can acquire information about the delay inserted by each tunnel (each tunnel is attached to a separate NIC) and the number of packets waiting in the NIC’s queues. The LB algorithms discussed can also be run in the user space but will be necessary to use functions that allow access from the user space to the mentioned queues. It should also be mentioned that the GT-based LB algorithms proposed can obtain all the parameters necessary for performing the LB operations by analyzing the evolution in time of the queues mentioned above. The identification of the service flows and the measurement of packet rates or the interpacket delays can be carried out by analyzing the content and evolution in time of the IP stack queue. The measurement of the delays suffered by various packets and the congestion level on the communication tunnels implementing the backhaul connections can be achieved by analyzing the evolution in time of the NICs’ transmit queues. No other measurement of the macro cell wireless links parameters is necessary, which simplifies the system, not being necessary to use specific measurement techniques for different macro cell links technologies. Moreover, the change of the macro cell wireless links characteristics and/or parameters will not require changes in the LB algorithms.

3.3.3. Evaluation of the Proposed User Clustering Algorithms

The evaluation of the user clustering algorithms was performed in the same conditions as the evaluation of the LB algorithms, meaning that the number of users and the traffic mix considered is the same. The scenarios considered are those presented in Figure 4, i.e., the scenario with the deployment of 2 APs and the scenario with the deployment of 3 APs. The APs are located at fixed distances D, D = 100 m in the simulations performed, and the users are spread uniformly between the 2 or the 3 APs. The traffic types are randomly distributed among the users, but the imposed traffic mix is maintained (see Table 2). To simplify the simulations, it is considered that to each AP it is attached a single virtual tunnel, which could be the aggregation of several separate virtual tunnels. The transfer rate of these aggregated tunnels originating in the APs was simulated as in the case of the evaluation of the LB algorithms, the same traffic models being used. The parameters of the channel models were selected to obtain approximately the same average transfer rate on each aggregated tunnel (approximately 20 Mbps). The step used to adjust the power of the APs was set to 1 dB in some experiments and 2 dB in other experiments, but no significant difference can be identified between the results obtained in these two cases. In all scenarios, the statistics of the delays suffered by the transmitted packets are evaluated. Figure 14 presents the pdf of the packet delays in the system (the sojourn time) in the scenario with two APs and the following cases:
  • the two APs work separately, and no user clustering algorithm is used. The clustering of the users is performed only at the beginning of the simulation by attaching each user to the AP from which it receives the largest power–see Figure 14a.
  • a non-cooperative type of user clustering is used, each AP adjusting its transmission power only based on its local QSI and CSI–see Figure 14b.
  • a cooperative user clustering algorithm is used, each AP having access to the QSI and CSI of other APs or being controlled by an AP Controller who has access to all APs’ QSI and CSI. If the controller is used this module implements the AP cooperation process and sets the transmission power of each APs–see Figure 14c.
Figure 14 presents separately the pdf of the delay suffered by the transmitted packets on the two tunnels and the pdf of the delays suffered by all the packets transmitted by the system, meaning the pdf on the combined tunnel used by the system.
The results presented in Figure 14 show the effects of the LB performed by the clustering algorithms among the APs. If no clustering is used most of the users might be attached to one of the APs, one of the outgoing aggregated tunnels being heavily loaded (red curve in Figure 14a) while the other tunnel (the blue curve in Figure 14a) is underused. If any of the clustering algorithms are used the difference in the traffic loads on the two aggregated tunnels becomes significantly smaller. To better assess the statistics of the delays suffered by the data packets on the two aggregated tunnels in the considered situations the cdf of the packet’s delays is presented in Figure 15.
The results presented in Figure 15 show clearly the huge difference in performance, in what concerns the packet delays, of the systems with no users clustering (Figure 15a) and with user clustering (Figure 15b,c). Comparing Figure 15b,c we can see the difference between the non-cooperative and the cooperative clustering algorithms. In Figure 15c the curves converge around 500 ms while in Figure 15b the curves converge around 1500 ms. Still, should be noticed that the differences in the performance depicted in Figure 15b,c, i.e., the distribution of the packet’s delays, are small.
Figure 16 presents the pdf of the packet delays in the system (the sojourn time) in the scenario with three APs and the following cases:
  • the three APs work separately, and no user clustering algorithm is used. The clustering of the users is performed only at the beginning of the simulation by attaching each user to the AP from which it receives the largest power–see Figure 16a.
  • a cooperative user clustering algorithm is used, and the APs power adjustment step is set to 1 dB–see Figure 16b.
  • a cooperative user clustering algorithm is used, and the APs power adjustment step is set to 2 dB–see Figure 16c.
A cooperative user clustering algorithm with separate a power adjustment step for the central AP (1 dB) and for the side APs (0.5 dB) was also tested in the same conditions, but the results are very similar to those presented in Figure 16b, i.e., 1 dB power adjustment step. In Figure 16 are presented the pdfs of the packet delays on each tunnel and the combined tunnel used by the simulated system.
In Figure 16a, when no clustering algorithm is used, there is a significant difference between the load of tunnel 2 (red curve) and tunnels 1 and 3 (blue and magenta curves), these two last tunnels being more loaded, especially tunnel 1 (blue curve). If the clustering algorithms are used, the load of the APs and the outgoing tunnels attached to the APs will change, and the load of tunnel 1 will decrease significantly, its load being distributed between tunnel 2 and 3 which will become more loaded, especially tunnel 3. Should be noticed that the performance of the clustering algorithm depends significantly on the position of the users and the characteristics of the service flows generated by the users and an optimal (more exactly close to optimal) distribution of the traffic between APs is not possible without using more complex clustering algorithms with more complex interaction between the APs and the users. The difference between the load of the APs in the 3 situations mentioned above is more visible if we analyze the cdfs of the packet delays depicted in Figure 17. In Figure 17a all curves converge around 3500 ms, while in Figure 17b,c all curves converge around 1500 ms. The performance of LB among the APs for power adjustment step 1 dB and 2 dB are very close.
It should be noticed that the clustering algorithms, like the LB algorithms acting on the backhaul communication tunnels, require access only to the queue of the IP stack and the driver of the NIC that provides the AP-user connectivity. Identification of the data flows and the measurement of the parameters of these flows can be achieved by analyzing the content of the IP stack queue while the load of the AP-users connection can be assessed by analyzing the evolution in time of the length of the NIC’s driver queue.

4. Conclusions

The paper considers the issue of LB over several wireless links set up in a heterogeneous cellular system, wireless links which are used as backhaul connections for the AP of a small cell. The paper proposes game theory-based algorithms for distributing the data flows generated by the users connected to the AP of the small cell over the wireless links of several macro cells, possibly owned by different operators, which cover the small cell. More precisely the Selfish Routing LB algorithm, the Auction-based LB, and the Combinatorial Auction-based LB algorithms are proposed. As references, the classical Round Robin algorithm and an algorithm based on the Multiple Knapsack problem were considered. Computer simulations performed in a complex scenario involving four macro cells and a mobile AP, i.e., installed in a vehicle, and in the condition of a congested network show that the Auction-based LB and the Combinatorial Auction-based LB algorithms have the best performance, while the performance of the Selfish Routing LB algorithm is weaker than that of the reference Multiple Knapsack LB algorithm, or is similar with the performance of this reference algorithm if the signaling penalty is not considered.
The simulations show that in the condition of congested networks the Combinatorial Auction-based LB algorithm and the Auction-based LB algorithm are capable to manage efficiently the available resources, i.e., to distribute efficiently the flows on the available tunnels, and the packets’ delays can be kept below some limits. The Multiple Knapsack LB algorithm can manage well the LB operations for some reduced traffic values, and reduced packet delays are ensured with probabilities close to that obtained with the Auction-based LB algorithm. In the situation of larger (instantaneous) traffic values the performance of the Multiple Knapsack LB algorithm decreases, and larger delays appear with large probabilities, meaning that the LB operations are performed less efficiently compared to the GT-based LB algorithms. The Round Robin LB algorithm has, as expected, poor performance, large (even very large) packet delays appearing with high probabilities.
The proposed GT-based LB algorithms are not constrained only to the data communication scenario considered by this paper. The algorithms are general enough to be adapted to other communication scenarios, involving both wireless and wired connection, when LB operations are necessary to distribute data flows over parallel communication channels/tunnels.
The paper also proposes two game theory-based algorithms for user clustering when several small cell APs are deployed. These algorithms select the users who connect to each AP, the goal being to avoid the overloading of some APs while other neighbor APs have available resources. The proposed algorithms use a simple power adjustment-based user clustering to avoid more complex interaction and signaling between the users and the APs. The performed simulations show that even in the case of simple clustering mechanisms the load could be distributed relatively well between the deployed APs and therefore a noticeable decrease in the packets’ delays on the virtual tunnels attached to the APs is visible.

Author Contributions

Conceptualization, Z.A.P. and M.V.; methodology, Z.A.P.; software, M.V.; validation, Z.A.P. and M.V.; formal analysis, Z.A.P.; investigation, M.V.; resources, Z.A.P.; writing—original draft preparation, Z.A.P.; writing—review and editing, Z.A.P. and M.V.; visualization, M.V.; supervision, Z.A.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Data Traffic Modeling

Appendix A.1. Best Effort Traffic: FTP

An FTP session is composed of a succession of file transfers separated by some time intervals, the so-called reading time. The main FTP session parameters are (see Table A1):
  • The size S of a file to be transferred;
  • The reading time D, i.e., the time interval between the end of the download of the previous file and the beginning of the next file transfer.
Based on experimental evaluation of the FTP sessions was observed that for each file transfer a separate TCP connection is used and that around 76% of the files were transferred using a Maximum Transmission Unit (MTU) of 1500 bytes and around 24% of the files were transferred using an MTU of 576 bytes.
Table A1. FTP traffic parameters.
Table A1. FTP traffic parameters.
ParameterStatistical Characterization
File Size STruncated Lognormal Distribution
Mean = 2 Mbytes, Standard Deviation = 0.722 Mbytes, Maximum = 5 Mbytes (before truncation)
pdf: f x = 1 2 π σ x e ln x μ 2 2 σ 2 , x > 0, σ = 0.35, μ = 14.45
Reading Time DExponential Distribution
Mean = 180 s
pdf: f x = λ e λ x  x ≥ 0, λ = 0.006

Appendix A.2. Interactive Traffic: Web Browsing Using HTTP

A web page is formed of a main object and a set of embedded objects (e.g., pictures, advertisements, etc.). After the main page is received, the web browser parses the embedded objects. The main parameters that characterize the HTTP web browsing are (see Table A2):
  • The main size of an object SM;
  • The size of an embedded object in a page SE;
  • The number of embedded objects ND;
  • Reading time D;
  • Parsing Time for the embedded page TP;
Table A2. Web-browsing traffic parameters.
Table A2. Web-browsing traffic parameters.
ParameterStatistical Characterization
Main Object Size SMTruncated Lognormal distribution. Mean = 25,032 bytes, Standard Deviation = 10,710 bytes, Minimum = 100 bytes, Maximum = 2 Mbytes (before truncation)
pdf: f x = 1 2 π σ x e ln x μ 2 2 σ 2 , x > 0, σ = 1.37, μ = 8.37
Embedded Object Size SETruncated Lognormal distribution
Mean = 126,168 bytes, Standard Deviation = 7758 bytes, Minimum = 50 bytes, Maximum = 2 Mbytes (before truncation).
pdf: f x = 1 2 π σ x e ln x μ 2 2 σ 2 , x ≥ 0, σ = 2.36, μ = 6.17
Number of Embedded Objects per Page = NDTruncated Pareto distribution
Mean = 5.64, Maximum = 53 (Before Truncation)
pdf: f x = α k α α + 1 , k x < m , f x = k m α , x = m , α = 1.1, k = 2, m = 55
Reading Time DExponential Distribution, Mean = 30 s
pdf: f x = λ e λ x , x 0 , λ = 0.033
Parsing Time TPExponential distribution, Mean = 0.13 s
pdf: f x = λ e λ x , x 0 , λ = 7.69

Appendix A.3. VoIP Traffic

Table A3 presents the most important parameters that characterize the VoIP traffic and that were used in the performed simulations. A simple 2-state voice activity model is considered, and the state of the model coder is updated at the speech encoder frame rate R = 1/T, where T is the encoder frame period (typically 20 ms).
Table A3. VoIP traffic parameters.
Table A3. VoIP traffic parameters.
ParameterStatistical Characterization
CodecRTP AMR 12.2, Source rate 12.2 kbps
Encoder frame length20 ms
Voice activity factor 50%
SID (Silence Insertion Descriptor) payloadModelled: 15 bytes (5 bytes + header)
SID packet every 160 ms during silence
Protocol overhead with compressed header10 bits + padding (RTP-pre-header)
4 bytes (RTP/UDP/IP), 2 bytes (RLC/security), 16 bits (CRC)
Total voice payload on the air interface40 bytes (AMR 12.2)

Appendix A.4. Video Streaming Traffic

The frames of a video stream arrive at regular time interval T correlated with the number of frames per second. Each frame is composed of a fixed number of slices, each slice transmitted as a single packet. The sizes of the slices are modeled by a Truncated Pareto distribution. The video encoder introduces delays between the packets of a frame. These delays are also modeled by a truncated Pareto distribution. The following distributions assume a source video rate of 64 kbps. The video streaming traffic parameters are given in Table A4.
Table A4. Video streaming traffic parameters.
Table A4. Video streaming traffic parameters.
ParameterStatistical Characterization
Inter-arrival time between the beginning of each frameDeterministic
100 ms (based on 10 frames per second)
Number of packets (slices) in a frameDeterministic, 8 packets per frame
Packet (slice) sizeTruncated Pareto distribution
Mean = m = 20 bytes, Maximum = 250 bytes (before truncation)
pdf: f x = α k α x α + 1 ,   k x < m , f x = k m α , x = m , α = 1.2, k = 10 bytes
Inter-arrival time between packets (slices) in a frameTruncated Pareto distribution
Mean = m = 6 ms, Maximum = 12.5 ms (before truncation)
pdf: f x = α k α x α + 1 ,   k x < m , f x = k m α ,   x = m , α = 1.2, k = 2.5 ms

Appendix A.5. Interactive Real-Time Services: Online Gaming

It is supposed that the starting time of an online gaming session is uniformly distributed within [0, 40 ms]. This is necessary for the simulation of the random timing relationship between packet arrival and uplink frame boundary. A maximum delay of 160 ms is allowed for all uplink packets, and a packet is dropped if this maximum delay is not fulfilled. The delay of a dropped packet is counted as 180 ms.
If the average packet delay is greater than 60 ms the gaming session is considered to be in outage. The online gaming traffic parameters are given in Table A5.
Table A5. Online gaming traffic parameters.
Table A5. Online gaming traffic parameters.
ParameterStatistical Characterization
Initial packet arrivalUniform Distribution
pdf: f x = 1 b a ,   a x b  a = 0, b = 40 ms
Packet arrivaluplink: deterministic, 40 ms
downlink: Largest Extreme Value distribution
pdf: f x = 1 b e x a b e e x a b , a = 55 ms, b = 6 ms
Packet sizeLargest Extreme Value distribution
pdf: f x = 1 b e x a b e e x a b
uplink: a = 45 bytes, b = 5.7 bytes
downlink: a = 120 bytes, b = 36 bytes
UDP headerDeterministic (2 bytes).

References

  1. 3GPP. TS 123.501 Version 16.6.0 Release 16—5G; System Architecture for the 5G System (5GS). Technical Specifications. October 2020. Available online: https://www.etsi.org/deliver/etsi_ts/123500_123599/123501/16.06.00_60/ts_123501v160600p.pdf (accessed on 10 September 2021).
  2. 5GPPP. View on 5G Architecture. White Paper, Version 3. February 2020. Available online: http://doi.org/10.5281/zenodo.3265031 (accessed on 12 September 2021).
  3. Okasaka, S.; Weiler, R.J.; Keusgen, W.; Pudeyev, A.; Maltsev, A.; Karls, I.; Sakaguchi, K. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular. Sensors 2016, 16, 1362. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Hur, S.; Kim, T.; Love, D.J.; Krogmeier, J.V.; Thomas, T.A.; Ghosh, A. Millimeter Wave Beamforming for Wireless Backhaul and Access in Small Cell Networks. IEEE Trans. Comm. 2013, 61, 4391–4403. [Google Scholar] [CrossRef] [Green Version]
  5. Bhushan, N.; Li, J.; Malladi, D.; Gilmore, R.; Brenner, D.; Damnjanovic, A.; Sukhavasi, R.T.; Patel, C.; Geirhofer, S. Network Densification: The Dominant Theme for Wireless Evolution into 5G. IEEE Comm. Mag. 2014, 52, 82–89. [Google Scholar] [CrossRef]
  6. Chen, D.C.; Quek, T.Q.S.; Kountouris, M. Backhauling in Heterogeneous Cellular Networks: Modeling and Tradeoffs. IEEE Trans. Wireless Comm. 2015, 14, 3194–3206. [Google Scholar] [CrossRef]
  7. Legonkov, P.; Prokopov, V. Small Cell Wireless Backhaul in Mobile Heterogeneous Networks. Master’s Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, July 2012. [Google Scholar]
  8. Chen, D.; Schuler, J.; Wainio, P. 5G Self-optimizing Wireless Mesh Backhaul. In Proceedings of the 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, China, 26 April–1 May 2015; pp. 23–24. [Google Scholar]
  9. 5G PPP. Vision on Software Networks and 5G. White Paper, Version 2.0. January 2017. Available online: https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP_SoftNets_WG_whitepaper_v20.pdf (accessed on 17 October 2021).
  10. Bazzi, A.; Pasolini, G.; Andrisano, O. Multiradio Resource Management: Parallel Transmission for Higher Throughput? Eurasip J. Adv. Signal Process. 2008, 2008, 763264. [Google Scholar] [CrossRef] [Green Version]
  11. Louha, K.; Jun, J.H.; Agrawal, D.P. Exploring Load Balancing in Heterogeneous Networks by Rate Distribution. In Proceedings of the 2008 IEEE International Conference on Performance, Computing and Communications Conference (IPCCC 2008), Austin, TX, USA, 7–9 December 2008; pp. 427–432. [Google Scholar]
  12. Son, H.; Lee, S.; Kim, S.C.; Shin, Y.S. Soft Load Balancing Over Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 2008, 57, 2632–2638. [Google Scholar]
  13. Wang, N.; Shi, W.; Fai, S.; Liu, Y. Flow Diversion-Based Vertical Handoff Algorithm for Heterogeneous Wireless Networks. J. Comput. Inf. Syst. 2011, 7, 4863–4870. [Google Scholar]
  14. Shi, W.; Li, B.; Li, N.; Xia, C. A Network Architecture for Load Balancing of Heterogeneous Wireless Networks. J. Netw. 2011, 6, 623–630. [Google Scholar] [CrossRef] [Green Version]
  15. Xu, J.; Jiang, Y.; Perkis, A. Multi-Service Load Balancing in a Heterogeneous Network with Vertical Handover. Adv. Electron. Telecommun. 2011, 2, 43–49. [Google Scholar]
  16. Macriga, G.A.; Surya, V.S. Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks. In Advances in Computer Science and Information Technology. Networks and Communications, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Berlin/Heidelberg, Germany, 2012; Volume 84, pp. 383–393. [Google Scholar]
  17. Nguyen-Vuong, Q.-T.; Agoulmine, N. Efficient Load Balancing Algorithm over Heterogeneous Wireless Packet Networks. Rev. J. Electron. Comm. 2011, 1, 53–61. [Google Scholar] [CrossRef]
  18. Tsompanidis, I.; Zahran, A.H.; Sreenan, C.J. Towards Utility-Based Resource Management in Heterogeneous Wireless Networks. In Proceedings of the 7th ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch’12), Istanbul, Turkey, 22 August 2012; pp. 23–28. [Google Scholar]
  19. Yang, J. A Markov Decision Process (MDP) Based Load Balancing Algorithm for Multi-Cell Networks with Multi-Carriers. KSII Trans. Internet Inf. Syst. 2014, 8, 3394–3408. [Google Scholar]
  20. Thai, M.-T.; Lin, Y.-D.; Lai, Y.-C. A Joint Network and Server Load Balancing Algorithm for Chaining Virtualized Network Functions. In Proceedings of the 2016 IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  21. De Schepper, T.; Latre, S.; Famaey, J. A Transparent Load Balancing Algorithm for Heterogeneous Local Area Networks. In Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2017), Lisbon, Portugal, 8–12 May 2017; pp. 160–168. [Google Scholar]
  22. Hossain, S.; Jahid, A.; Islam, K.Z.; Alsharif, M.H.; Rahman, K.M.; Rahman, F.; Hossain, F. Towards Energy Efficient Load Balancing for Sustainable Green Wireless Networks Under Optimal Power Supply. IEEE Access 2020, 8, 200635–200654. [Google Scholar] [CrossRef]
  23. Ai, N.; Wu, B.; Li, B.; Zhao, Z. 5G Heterogeneous Network Selection and Resource Allocation Optimization Based on Cuckoo Search Algorithm. Comput. Commun. 2021, 168, 170–177. [Google Scholar] [CrossRef]
  24. Mamane, A.; EL Ghazi, M.; Barb, G.-R.; Otesteanu, M. 5G Heterogeneous Networks: An Overview on Radio Resource Management Scheduling Schemes. In Proceedings of the 2019 7th Mediterranean Congress of Telecommunications (CMT), Fez, Morocco, 24–25 October 2019; pp. 1–5. [Google Scholar]
  25. Hassine, K.; Frikha, M.; Chahed, T. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks. Wirel. Commun. Mob. Comput. 2017, 2017, 3523868. [Google Scholar] [CrossRef] [Green Version]
  26. Siar, H.; Kiani, K.; Chronopoulos, A.T. A Combination of Game Theory and Genetic Algorithm for Load Balancing in Distributed Computer Systems. Int. J. Adv. Intell. Paradig. 2016, 9, 82–95. [Google Scholar] [CrossRef]
  27. Mondal, S.; Das, G.; Wong, E. A Game-Theoretic Approach for Non-Cooperative Load Balancing Among Competing Cloudlets. IEEE Open J. Comm. Soc. 2020, 1, 226–241. [Google Scholar] [CrossRef]
  28. Swathy, R.; Vinayagasundaram, B.; Rajesh, G.; Nayyar, A.; Abouhawwash, M.; Elsoud, M.A. Game Theoretical Approach for Load Balancing Using SGMLB Model in Cloud Environment. PLoS ONE 2020, 15, e0231708. [Google Scholar] [CrossRef]
  29. Mrhari, A.; Hadi, Y. Load Balancing on the Data Center Broker Based on Game Theory and Metaheuristic Algorithms. Complex Syst. 2020, 29, 711–728. [Google Scholar] [CrossRef]
  30. Kishora, A.; Niyogia, R.; Veeravallib, B. A Game-Theoretic Approach for Cost-Aware Load Balancing in Distributed Systems. Future Gener. Comput. Syst. 2020, 109, 29–44. [Google Scholar] [CrossRef]
  31. Asif, M.; Rehman, E.; Saleem, T.; Abid, M.; Habib, M.; Aslam, M.; Jilani, S.F. Incentive-Based Schema Using Game Theory in 5/6G Cellular Network for Sustainable Communication System. Sustainability 2022, 14, 10163. [Google Scholar] [CrossRef]
  32. Polgar, Z.A.; Varga, M. Game Theory Based Load Balancing Algorithms Over Multiple Virtual Tunnels. In Proceedings of the 2022 45th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 13–15 July 2022; pp. 110–115. [Google Scholar]
  33. Ephraim, Y.; Coblenz, J.; Mark, L.; Lev-Ari, H. Mixed Poisson Traffic Rate Network Tomography. In Proceedings of the 2021 55th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 19 April 2021; pp. 1–6. [Google Scholar]
  34. Adan, I.; Resing, J. Queueing Theory, 1st ed.; Department of Mathematics and Computing Science, Eindhoven University of Technology: Eindhoven, The Netherlands, 2001. [Google Scholar]
  35. Shen, W.; Li, Y.; Ghenniwa, H.H.; Wang, C. Adaptive Negotiation for Agent-Based Grid Computing. In Proceedings of the 2002 1st International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS’02), Bologna, Italy, 15–19 July 2002; pp. 32–36. [Google Scholar]
  36. Pertovt, E.; Javornik, T.; Mohorcic, M. Game Theory Application for Performance Optimization in Wireless Networks. Elektrotehniški Vestn. Engl. Ed. 2011, 78, 287–292. [Google Scholar]
  37. Roughgarden, T. Routing Games. In Algorithmic Game Theory, 1st ed.; Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V., Eds.; Cambridge University Press: Cambridge, MA, USA, 2007; pp. 461–486. [Google Scholar]
  38. Roughgarden, T. The Price of Anarchy is Independent of the Network Topology. J. Comput. Syst. Sci. 2003, 67, 341–364. [Google Scholar] [CrossRef] [Green Version]
  39. Easley, D.; Kleinberg, J. Networks, Crowds, and Markets: Reasoning About a Highly Connected World, 1st ed.; Cambridge University Press: Cambridge, MA, USA, 2010. [Google Scholar]
  40. Touati, C.; Altman, E.; Galtier, J. Generalized Nash Bargaining Solution for bandwidth allocation. Comput. Netw. 2006, 50, 3242–3263. [Google Scholar] [CrossRef] [Green Version]
  41. Shao, Y.; Xu, H.; Yin, W. Solve Zero-One Knapsack Problem by Greedy Genetic Algorithm. In Proceedings of the 2009 International Workshop on Intelligent Systems and Applications, Wuhan, China, 23–24 May 2009; pp. 1–4. [Google Scholar]
  42. Kiss, Z.I.; Hosu, A.C.; Varga, M.; Polgar, Z.A. Load Balancing Solutions for Heterogeneous Wireless Networks Based on the Knapsack Problem. In Proceedings of the 2015 38th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 9–11 July 2015; pp. 1–6. [Google Scholar]
  43. 3GPP. TSG-RAN1#48, R1-070674—LTE Physical Layer Framework for Evaluation. Technical Specifications. February 2007. Available online: https://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_48/Docs (accessed on 20 November 2021).
  44. IEEE. IEEE P802.20-PD-10—System Requirements for IEEE 802.20 Mobile Broadband Wireless Access Systems. 802.20 Permanent Document. September 2005. Available online: https://grouper.ieee.org/groups/802/20/Documents.htm (accessed on 25 November 2021).
  45. Bolton, W.; Xiao, Y.; Guizani, M. IEEE 802.20: Mobile Broadband Wireless Access. IEEE Wirel. Commun. 2007, 14, 84–95. [Google Scholar] [CrossRef]
  46. Monogioudis, P.; Kogiantis, A. Wideband Extension of the ITU Profiles with Desired Spaced-Frequency Correlation, IEEE C802.16m-07/181. September 2007. Available online: https://ieee802.org/16/tgm/contrib/C80216m-07_157.pdf (accessed on 8 December 2021).
  47. Powers, S. Queuing in the Linux Network Stack. Linux J. 2013, 2013, 2. Available online: https://www.linuxjournal.com/content/july-2013-issue-linux-journal-networking (accessed on 27 October 2022).
Figure 1. The considered networking scenario.
Figure 1. The considered networking scenario.
Applsci 13 01485 g001
Figure 2. Heterogeneous network architecture that provides ubiquitous connectivity to public transportation vehicles.
Figure 2. Heterogeneous network architecture that provides ubiquitous connectivity to public transportation vehicles.
Applsci 13 01485 g002
Figure 3. The system model of the considered networking scenario.
Figure 3. The system model of the considered networking scenario.
Applsci 13 01485 g003
Figure 4. Networking scenario with several APs deployment: (a) 2 AP deployment; (b) 3 AP deployment.
Figure 4. Networking scenario with several APs deployment: (a) 2 AP deployment; (b) 3 AP deployment.
Applsci 13 01485 g004
Figure 5. Potential functions for delay sensitive and best effort traffic types: (a) Variation of the potential function for delay sensitive traffic with latency τi when coefficient ci has different values; (b) Variation of the potential function for best effort traffic with the instantaneous bit rate of the tunnel, Li, for different values of the expected average bit rate R i a v .
Figure 5. Potential functions for delay sensitive and best effort traffic types: (a) Variation of the potential function for delay sensitive traffic with latency τi when coefficient ci has different values; (b) Variation of the potential function for best effort traffic with the instantaneous bit rate of the tunnel, Li, for different values of the expected average bit rate R i a v .
Applsci 13 01485 g005
Figure 6. The block diagram of the simulation platform used for the evaluation of the LB algorithms.
Figure 6. The block diagram of the simulation platform used for the evaluation of the LB algorithms.
Applsci 13 01485 g006
Figure 7. Effective SNR–bitrate mapping.
Figure 7. Effective SNR–bitrate mapping.
Applsci 13 01485 g007
Figure 8. Variation in time of the capacity of the tunnels established over the macro cell wireless links.
Figure 8. Variation in time of the capacity of the tunnels established over the macro cell wireless links.
Applsci 13 01485 g008
Figure 9. The block diagram of the simulation platform used for the evaluation of the user clustering algorithms.
Figure 9. The block diagram of the simulation platform used for the evaluation of the user clustering algorithms.
Applsci 13 01485 g009
Figure 10. Statistical characterization of the packet delays inserted by the considered LB algorithms: (a) The pdfs of the packet delays; (b) The cdfs of the packet delays.
Figure 10. Statistical characterization of the packet delays inserted by the considered LB algorithms: (a) The pdfs of the packet delays; (b) The cdfs of the packet delays.
Applsci 13 01485 g010
Figure 11. Statistical characterization of the packet delays inserted by the bests of the considered LB algorithms: (a) The pdfs of the packet delays; (b) The cdfs of the packet delays.
Figure 11. Statistical characterization of the packet delays inserted by the bests of the considered LB algorithms: (a) The pdfs of the packet delays; (b) The cdfs of the packet delays.
Applsci 13 01485 g011
Figure 12. Price of anarchy, maxNE, for the simulated virtual tunnels. (a) maxNE versus the absolute total rate Rmax; (b) maxNE versus the relative total rate Rmax/Rav-tunnel.
Figure 12. Price of anarchy, maxNE, for the simulated virtual tunnels. (a) maxNE versus the absolute total rate Rmax; (b) maxNE versus the relative total rate Rmax/Rav-tunnel.
Applsci 13 01485 g012
Figure 13. A simplified high-level overview of the queues on the transmit path of the Linux OS network stack.
Figure 13. A simplified high-level overview of the queues on the transmit path of the Linux OS network stack.
Applsci 13 01485 g013
Figure 14. Statistical characterization of the packet delays on the aggregated virtual tunnels when 2 APs and different user clustering algorithms are used: (a) The pdfs of the packet delays when no user clustering algorithm is used; (b) The pdfs of the packet delays when the non-cooperative user clustering algorithm is used; (c) The pdfs of the packet delays when the cooperative user clustering algorithm is used.
Figure 14. Statistical characterization of the packet delays on the aggregated virtual tunnels when 2 APs and different user clustering algorithms are used: (a) The pdfs of the packet delays when no user clustering algorithm is used; (b) The pdfs of the packet delays when the non-cooperative user clustering algorithm is used; (c) The pdfs of the packet delays when the cooperative user clustering algorithm is used.
Applsci 13 01485 g014
Figure 15. The Cumulative Density Functions of the packet delays on the aggregated virtual tunnels when 2 APs and different user clustering algorithms are used: (a) The cdfs of the packet delays when no user clustering algorithm is used; (b) The cdfs of the packet delays when the non-cooperative user clustering algorithm is used; (c) The cdfs of the packet delays when the cooperative user clustering algorithm is used.
Figure 15. The Cumulative Density Functions of the packet delays on the aggregated virtual tunnels when 2 APs and different user clustering algorithms are used: (a) The cdfs of the packet delays when no user clustering algorithm is used; (b) The cdfs of the packet delays when the non-cooperative user clustering algorithm is used; (c) The cdfs of the packet delays when the cooperative user clustering algorithm is used.
Applsci 13 01485 g015
Figure 16. Statistical characterization of the packet delays on the aggregated virtual tunnels when 3 APs and different user clustering algorithms are used: (a) The pdfs of the packet delays when no user clustering algorithm is used; (b) The pdfs of the packet delays when the cooperative user clustering algorithm with 1 dB power adjustment step is used; (c) The pdfs of the packet delays when the cooperative user clustering algorithm with 2 dB power adjustment step is used.
Figure 16. Statistical characterization of the packet delays on the aggregated virtual tunnels when 3 APs and different user clustering algorithms are used: (a) The pdfs of the packet delays when no user clustering algorithm is used; (b) The pdfs of the packet delays when the cooperative user clustering algorithm with 1 dB power adjustment step is used; (c) The pdfs of the packet delays when the cooperative user clustering algorithm with 2 dB power adjustment step is used.
Applsci 13 01485 g016
Figure 17. The Cumulative Density Functions of the packet delays on the aggregated virtual tunnels when 3APs and different user clustering algorithms are used: (a) The cdfs of the packet delays when no user clustering algorithm is used; (b) The cdfs of the packet delays when the cooperative user clustering algorithm with 1 dB power adjustment step is used; (c) The cdfs of the packet delays when the cooperative user clustering algorithm with 2 dB power adjustment step is used.
Figure 17. The Cumulative Density Functions of the packet delays on the aggregated virtual tunnels when 3APs and different user clustering algorithms are used: (a) The cdfs of the packet delays when no user clustering algorithm is used; (b) The cdfs of the packet delays when the cooperative user clustering algorithm with 1 dB power adjustment step is used; (c) The cdfs of the packet delays when the cooperative user clustering algorithm with 2 dB power adjustment step is used.
Applsci 13 01485 g017
Table 1. Statistical parameters of the considered 4 virtual tunnels.
Table 1. Statistical parameters of the considered 4 virtual tunnels.
TunnelMax/MinMeanMedianStd.
1–red24/14.5 Mbps20.15 Mbps21.25 Mbps2.85 Mbps
2–blue18.5/14.25 Mbps16.5 Mbps16.5 Mbps1.15 Mbps
3–cyan14.75/1.5 Mbps6.5 Mbps5.75 Mbps4 Mbps
4–green8.5/5.25 Mbps6.75 Mbps6.75 Mbps0.925 Mbps
Table 2. Simulated traffic flows parameters.
Table 2. Simulated traffic flows parameters.
Traffic TypeTraffic MixtureLB Parameter
VoIP20% c i = 5   ms
Video streaming20%
Online gaming10%
Web browsing-HTTP30% R i a v = 10   Mbps
File transfer-FTP20%
Table 3. Values of the packet delay cdfs for the LB algorithms considered in Figure 11.
Table 3. Values of the packet delay cdfs for the LB algorithms considered in Figure 11.
LB Algorithmcdf Function/Packet Delay (ms)
Combinatorial Auction0.23/20 ms0.58/40 ms0.8/60 ms0.95/80 ms
Auction0.08/20 ms0.22/40 ms0.36/60 ms0.54/80 ms
Selfish routing no signaling penalty0.01/20 ms0.09/40 ms0.21/60 ms0.28/80 ms
Multiple Knapsack 0.025/20 ms0.1/40 ms0.21/60 ms0.38/80 ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Polgar, Z.A.; Varga, M. Game Theory-Based Load-Balancing Algorithms for Small Cells Wireless Backhaul Connections. Appl. Sci. 2023, 13, 1485. https://doi.org/10.3390/app13031485

AMA Style

Polgar ZA, Varga M. Game Theory-Based Load-Balancing Algorithms for Small Cells Wireless Backhaul Connections. Applied Sciences. 2023; 13(3):1485. https://doi.org/10.3390/app13031485

Chicago/Turabian Style

Polgar, Zsolt Alfred, and Mihaly Varga. 2023. "Game Theory-Based Load-Balancing Algorithms for Small Cells Wireless Backhaul Connections" Applied Sciences 13, no. 3: 1485. https://doi.org/10.3390/app13031485

APA Style

Polgar, Z. A., & Varga, M. (2023). Game Theory-Based Load-Balancing Algorithms for Small Cells Wireless Backhaul Connections. Applied Sciences, 13(3), 1485. https://doi.org/10.3390/app13031485

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop