Vous êtes sur la page 1sur 8

1218 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO.

7, SEPTEMBER 2008

Adaptive Routing Strategies in IEEE 802.16


Multi-Hop Wireless Backhaul Networks Based On
Evolutionary Game Theory
Markos P. Anastasopoulos Student Member, IEEE, Pantelis-Daniel M. Arapoglou, Member, IEEE, Rajgopal
Kannan, and Panayotis G. Cottis

Abstract—The high frequency segment (10-66GHz) of the protection against link failures and by allowing adaptive
IEEE 802.16 standard seems promising for the implementation rerouting strategies under adverse channel conditions.
of wireless backhaul networks carrying large volumes of Internet
From the physical layer point of view, given that line-of-
traffic. In contrast to wireline backbone networks, where channel
errors seldom occur, routing decisions in IEEE 802.16 networks sight (LOS) operation is specified for IEEE 802.16 Wireless-
are conditioned by wireless channel impairments rather than MAN in the frequency range 10-66GHz [3], two operating
by congestion, exclusively. This renders a cross-layer routing conditions exist:
approach between the routing and the physical layers more
appropriate during fading periods. In this paper, an adaptive (a) Favourable channel conditions for high annual percent-
cross-layer routing scheme is presented based on the selection of ages corresponding to clear sky and
the most reliable path in terms of packet error ratio (unipath (b) Unfavourable channel conditions for small annual per-
routing). The paper argues that routing Internet traffic through centages corresponding to rain fading, causing high error
wireless backhaul networks is modeled more realistically em- rates, thereby deteriorating transmission [4].
ploying evolutionary rather than conventional game theory. The
stability of the proposed routing algorithm is proven and the In the first case, typical routing algorithms may be employed
dependence of the speed of convergence on various physical layer to deal with congestion, whereas, in the second, a cross-layer
parameters is investigated. Is is also shown that convergence may approach between the routing layer and the physical layer
be further accelerated by increasing the amount of information
seems more appropriate to take into account severe physical
from the physical layer, specifically the physical separation
between the alternative paths provided to the routing layer. layer impairments [5].
As for routing IP traffic, typical routing algorithms which
Index Terms—Evolutionary game theory, IEEE 802.16, multi-
hop wireless backhaul networks, adaptive routing.
allow a single entity to take the routing decisions based on an
overall network optimization criterion seem to be inefficient
[6]. As a consequence, the current trend is to allow the network
I. I NTRODUCTION nodes themselves to adaptively choose their routing strategy.
This allows nodes to optimize their own performance selfishly,
I NTERNET based multimedia applications, such as voice
and video, have been the locomotive for the recent growth
of broadband access technologies. Although conventional
that is without considering the impact on the overall network
[7], [8]. In case the routing decisions are taken by a finite
number of nodes, the appropriate optimization concept is
backbone networks (e.g. copper or optical fiber cables) can
based on the Nash Equilibrium (NE) [9]. In contrast, when
afford large bandwidths, backhaul networks carrying the ag-
each node carries a small portion of a large volume of traffic,
gregate traffic from the access points to the backbone net-
the Wardrop Equilibrium (WE) [10] seems more appropriate.
work through gateway stations remain the bottleneck of these
In conventional game theory, the objective of a player is to
multimedia applications [1]. Nevertheless, after the release
choose a routing strategy that maximizes its payoff. The game
of the IEEE 802.16 WirelessMAN WiMAX1 standard [2],
is played exactly once by fully rational players, all of them
multi-hop wireless backhaul networks (MHWBN) appear a
having complete and accurate knowledge about the details
cost effective solution to provide ubiquitous Internet services.
of the game. However, in modeling complex networks such
This is especially true for the high frequency air interface of
as MHWBN, it is questionable whether these assumptions
WiMAX in the 10-66GHz range, where bandwidth exceeding
are valid, since players not only have limited rationality but,
1GHz is available. Hence, compared with existing backhaul
also, whenever rain fading exists, the network becomes a
solutions, MHWBN significantly reduce deployment costs and
highly dynamic transmission environment. A more reasonable
also enable fast and flexible network configurations by offering
approach would be to let the players learn empirically how to
Manuscript received August 15, 2007; revised March 10, 2008. select their own routing strategies during the game; this leads
M. P. Anastasopoulos, P.-D. M. Arapoglou, and P. G. Cottis are with the to the concept of evolutionary game theory (EGT) [11], [12].
Wireless & Satellite Communications Group, Division of Information Trans- The present study focuses on setting up flows that adaptively
mission Systems and Materials Technology, School of Electrical & Computer
Engineering, National Technical University of Athens, Greece, GR15780 (e- route information via the most reliable path employing EGT
mail: mark@mail.ntua.gr, parap@central.ntua.gr, pcottis@central.ntua.gr). during periods when adverse channel conditions prevail. An
R. Kannan is with the Department of Computer Science, Louisiana State EGT based adaptive routing scheme, which depends on the
University (e-mail: rkannan@csc.lsu.edu).
Digital Object Identifier 10.1109/JSAC.2008.080918. observed path latencies has been discussed in [13]. However,
1 Worldwide interoperability for microwave access to the authors’ knowledge, no cross-layer work on this subject
0733-8716/08/$25.00 
c 2008 IEEE

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
ANASTASOPOULOS et al.: ADAPTIVE ROUTING STRATEGIES IN IEEE 802.16 MULTI-HOP WIRELESS BACKHAUL NETWORKS 1219

has been carried out so far, particularly for IEEE 802.16 the inequality
MHWBN. The large information flows accommodated by the
u[x, y + (1 − )x] > u[y, y + (1 − )x] (1)
MHWBN consist of packets –referred to as agents according
to the EGT terminology– each carrying an infinitesimal load holds for all  ∈ (0, ).
compared to the total traffic; this profile corresponds to IP A weaker notion of evolutionary stability also exists, called
traffic. The aim is to minimize the individual end-to-end neutral stability. Instead of requiring that all mutant strategies
packet error ratio (PER) without considering the impact on gain less than the incumbent strategy x, in neutral stability it
the overall network performance. The routing strategy of every is required that no mutant strategy prospers, in the sense that
agent is continuously updated by sampling all the alternative it gains a higher payoff than the incumbent strategy.
paths, taking advantage of the information obtained from the Definition 2. A strategy x is called neutral stable if, for
physical layer. The population of agents using each strategy every strategy y = x, a certain  ∈ (0, 1) exists, such that
is modeled based on the population dynamics model known inequality
as the replicator dynamics [14].
After a brief overview of EGT in Section II, its application u[x, y + (1 − )x] ≥ u[y, y + (1 − )x] (2)
to the proposed network model is presented in Section III, holds for all  ∈ (0, ).
where the maximum reliability routing problem is formulated Using the linearity property of the payoff function, (1)
applying EGT. First, it is proven that the proposed routing yields
algorithm is asymptotically stable. Also, the impact of several
physical layer parameters on the speed of convergence is (1 − )u(x, x) + u(x, y) > (1 − )u(y, x) + u(y, y) (3)
investigated. Motivated by the previous results, in Section IV,
If  is close to zero, (3) yields either
a simple algorithm –the path correlation coefficient (PCC)
algorithm– is proposed to accelerate the convergence of the u(x, x) > u(y, x) (4)
routing scheme. Finally, conclusions are drawn in Section V.
or
II. E VOLUTIONARY G AME T HEORY: BASIC C ONCEPTS u(x, x) = u(y, x) and u(x, y) > u(y, y) (5)

In a conventional game, the objective of a rational player is Hence, it becomes obvious that an ESS must be a NE;
to choose the strategy which maximizes its payoff. Instead, in otherwise, (4) does not hold. Furthermore, any strict NE is
the frame of EGT, the game is played repeatedly by agents2 an ESS [15].
randomly drawn from a large population [11], [12]. In general,
an evolutionary process combines two significant mechanisms: B. The Replicator Dynamics
a mutation mechanism which provides varieties and a selection
The replicator dynamics, first proposed by Taylor and
mechanism which favours some varieties over others. The role
Jonker [14], specifies how population shares associated with
of mutation is highlighted by the notion of Evolutionary Stable
different pure strategies evolve over time. In contrast to
Strategies (ESS) –which is a refinement of the NE–, while
evolutionary stability, in replicator dynamics agents are pro-
selection is associated to the replicator dynamics model, which
grammed to play only pure strategies4 . To define the replicator
assumes that a subpopulation grows (declines) when it plays
dynamics, we consider a large but finite population of agents
strategies that are better (worse) than average.
all programmed to play pure strategy k ∈ K, where K is
the set of strategies. At any instant t, let λk (t) ≥ 0 be the
A. Evolutionary Stable Strategies number of agents programmed to play pure strategy k. The

ESS is a key concept in EGT. A population following total population of agents is given by λ(t) = k∈K λk (t).
such a strategy is invincible. Specifically, suppose that the Let xk (t) = λk (t)/λ(t) be the fraction of agents using pure
initial population is programmed to play a certain pure or strategy k at time t. The associated population state is defined
mixed strategy3 x (the incumbent strategy). Then, let a small by the vector x(t) = [x1 (t), . . . , xk (t), . . . , xK (t)]. Then,
population share of agents  ∈ (0, 1) play a different pure or the expected payoff of using pure strategy k given that the
mixed strategy y (the mutant strategy). Hence, if an individual population is in state x is u(k, x) and the population average
is drawn to play the game, the probabilities that its opponent payoff, that is the payoff of an  agent drawn randomly from
K
plays the incumbent strategy x and the mutant strategy y are the population, is u(x, x) = k=1 xk · u(k, x). Suppose
1 −  and , respectively. The payoff of such a game is the that payoffs are proportional to the reproduction rate of each
same as that of a game where the individual plays the mixed individual and, furthermore, that a strategy profile is inherited.
strategy w = y + (1 − )x. The payoffs of strategies x and This leads to the following dynamics for the population shares
y given that the opponent adopts strategy w are denoted by xk
u(x, w) and u(y, w), respectively. ẋk = xk · [u(k, x) − u(x, x)] (6)
Definition 1. A strategy x is called evolutionary stable if,
where ẋk is the time derivative of xk . Equation (6) states
for every strategy y = x, a certain  ∈ (0, 1) exists, such that
that populations with better (worse) strategies than average
2 Players in EGT. grow (shrink). However, there are cases when even a strictly
3 In terms of routing, a strategy is characterized as pure (or mixed) when
a single (or multiple) path(s) is (are) selected to route the information to the 4 In network terminology, this assumption is related to packets not being
destination. fragmented while traversing multiple hops.

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
1220 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 7, SEPTEMBER 2008

dominated strategy may gain more than average. Hence, it is A is the appropriate physical layer metric. If the modulation
not a priori clear whether such strategies get wiped out in scheme, code rate, power level and packet size are known,
the replicator dynamics. The following theorem answers this PER may be expressed as an increasing function of A, that
question [11]: is P ER = f (A). Consequently, the data transfer reliability
Theorem 1: If a pure strategy k is strictly dominated then increases as A decreases and the most reliable path is the one
ξk (t, x0 )t→∞ → 0, where ξk (t, x0 ) is the population at time suffering from the minimum rain attenuation. Therefore, as
t and x0 is the initial state. indicated by the following cross-layer analysis, the decisions
On the other hand, it should be noted that the ratio xk /x related to routing with maximum reliability should be based on
of two population shares xk > 0 and x > 0 increases with rain attenuation, as determined from the inverse relationship
time if the strictly dominated strategy k gains a higher payoff A = f −1 (P ER).
than the strictly dominated strategy . This is a direct result
of (6) and may be expressed analytically via B. Rerouting Dynamics
 
d xk xk Originally, all agents select one of the possible routing paths
= [u(k, x) − u(, x)] (7)
dt x x at random. Since every agent wishes to minimize its own end-
From (7) it is evident that even suboptimal strategies could to-end PER from the source node S to the destination node
temporarily increase their share before being wiped out in the D, it reconsiders periodically its routing strategy by randomly
long run. However, there is a close connection between the sampling different paths and comparing the corresponding
steady states of the replicator dynamics, that is states where PER with its own PER. When a lower value is found, the
the population shares do not change their strategy over time, agent switches to a new path; otherwise, the current routing
strategy remains unchanged. It is evident that one of the basic
and NE. Thus, since in NE all strategies have the same average
payoff, every NE is a steady state. The reverse is not always elements of the replicator dynamics is the rate at which agents
true: Steady states are not necessarily NE, e.g., any state where revise their strategy. This rate depends on the performance of
all agents use the same pure strategy is a steady state, but, it the agents current strategy and on the population state x. In
is not stable [11]. the following, the average review rate of an agent employing
strategy k will be denoted as rk (x), k ∈ K. Significant
elements of the problem are the switching probabilities of
III. A PPLICATION TO M ULTI -H OP W IRELESS BACKHAUL a reviewing agent: The probability that a reviewing agent
N ETWORKS switches from strategy (path) k to strategy (path)  is denoted
A. Network Model by pk (x). Hence, the number of agents switching from path

Next, the general theoretical framework outlined in the k to path  is x k · rk (x) · pk (x). Consequently, the outflow

previous section is adapted to the routing problem under from path k is
 ∈K,=k xk ·rk (x) · pk (x)  = xk · rk (x) ·
 k
consideration. Specifically, consider an IEEE 802.16 MHWBN p
∈K,=k  k (x) = xk · rk (x) 1 − p k (x) , while the inflow
k
represented by an undirected graph G(N, L), where N is the to path k is ∈K,=k x ·r (x)·p (x). Subtracting the outflow
number of nodes and L is the number of links. It is assumed from the inflow, the following differential equation comes up
that the information generated at the source node S must be   
ẋk = x · r (x) · pk (x) − xk · rk (x) · 1 − pkk (x)
transmitted to the destination node D. For example, S and D
∈K,=k
may represent the gateway stations connecting the MHWBN to 
the Internet backbone at the two ends of the metropolitan area = x · r (x) · pk (x) − xk · rk (x) (9)
network. The set of all available paths (strategies) connecting ∈K
the source and the destination nodes is denoted by K. The net- which satisfies the replicator dynamics model introduced in
work information
 flow is accommodated by a total population (6).
of λ = k∈K λk packets (agents), where λk is the number of The procedure of sampling strategy  by an agent using
packets following path k. The normalized number of packets strategy k is based on the reported values of the rain at-
xk = λk /λ programmed to use each path is collected in the tenuation Ak and A along the corresponding paths k and
vector x = [x1 , . . . , xk , . . . , xK ] (population state). , respectively. The reviewing agent switches to the sampled
The objective is to find a positive flow vector λ = strategy if and only if the observed rain attenuation differ-
[λ1 , . . . , λk , . . . , λK ] that routes information via the paths ence is positive, i.e. Ak > A . The difference between the
k ∈ K with the minimum end-to-end PER, under the flow random variables Ak and A is also a random variable with
conservation condition a continuously differentiable cumulative distribution function
φ : R → [0, 1]. The conditional probability that an agent will
0 ≤ λk ≤ Λk , k∈K (8)
switch to strategy , given that its current strategy is k, is
where Λk is the capacity of path k. A similar formulation may
φ(Ak − A ) = Pr{Ak − A > 0|Ak > 0, A > 0} (10)
be found in [16]-[18], where multiple parallel paths are used
to route information from a single source node to a single The above probability is determined analytically in the Ap-
destination node. pendix, where a pure propagation approach is presented con-
In the present work, PER is used as a figure of merit cerning the joint statistics of rain fading over two paths taking
for the data transfer reliability. However, for LOS wireless into account their spatial correlation properties. Moreover,
links operating at frequencies above 10GHz, rain attenuation since the probability of an agent who samples path  is

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
ANASTASOPOULOS et al.: ADAPTIVE ROUTING STRATEGIES IN IEEE 802.16 MULTI-HOP WIRELESS BACKHAUL NETWORKS 1221

x (strategy profiles are inherited), the resulting conditional transformation x = X + u, (15) is transformed into the linear
switching probability is given by matrix equation
 du
= Qu (16)
xφ(Ak − A ) if k = 
pk (x) = (11) dt
1 − i=k,i∈K xi φ(Ak − Ai ) if k = 
where Q is a (K − 1) × (K − 1) matrix. Its elements are the
Assuming for simplicity that rk (x) = 1 reviews per unit of partial derivatives (17) evaluated at the equilibrium state X∗ .
time, ∀k ∈ K, the substitution of (11) into (9) yields the Equation (17) easily leads to the evaluation of Q
⎛ ⎞
following selection dynamics n21 0 ··· 0
 ⎜ 0 n31 · · · 0 ⎟
ẋk = xk x [φ(A − Ak ) − φ(Ak − A )] (12) ⎜ ⎟
Q=⎜ . . .. ⎟ (18)
∈K, k= ⎝ .. .. . ⎠
0 0 · · · nK1
Setting for brevity
From (18), it is deduced that n21 , n31 , . . . ,nK1 are the
nk = φ(A − Ak ) − φ(Ak − A ) (13) eigenvalues of Q. Since for every k, k = 2, . . . , K,
and substituting into (12), the following state equation results nk1 = −φ(Ak − A1 ) < 0 (19)
 ∗
ẋk = xk x · nk (14) the solution X = [0 0 · · · 0] is asymptotically stable and,
∈K,k= consequently, all information is routed via path 1. Given that a
strategy is evolutionary stable if and only if it is asymptotically
stable [19], this unipath routing strategy is also evolutionary
C. Stability Analysis
stable.
In this part of the analysis, the stability of the proposed The above analysis leads to the conclusion that, if the flow
routing algorithm is examined. It is proven that, if the system requirements do not exceed the capacity of the most reliable
operates under rain fading conditions, unipath routing is an path, all information will be routed via this path. Otherwise,
evolutionary stable strategy. Therefore, two paths k,  ∈ K if the capacity of the most reliable path cannot accommodate
connecting node S to node D cannot exhibit the same perfor- the information flow is required, a part of the flow will remain
mance with regard to reliability during data transfer. routed via the most reliable path and the rest of the flow will
Lemma 1: Under long term rain fading conditions, two be routed via the second, the third, and so on, next reliable
paths cannot suffer from the same level of rain attenuation. paths.
Proof: The proof of the Lemma is straightforward: Since
Ak and A are random variables in certain real number ranges, D. Convergence Analysis
the probability that the relevant paths suffer equally from long
To investigate the speed of convergence of the proposed
term rain attenuation tends to zero.
routing algorithm, the MHWBN topology depicted in Fig.1
Next, it is shown that under rain fading conditions, all data
is considered: Five multi-hop paths connect the source to the
are routed via a single path (unipath routing). The proof is
destination node. For simplicity, the horizontal and vertical
based on Lyapunov’s first method.
distances d between adjacent nodes are assumed equal. Also,
Theorem 2: Under long term rain fading, if the flow re-
P ER1 < P ER2 < P ER3 < P ER4 < P ER5 , that is A1 <
quirements do not exceed the path capacity, unipath routing
A2 < A3 < A4 < A5 is assumed. Since the focus is on a
is ESS.
cross-layer routing scheme, the speed of convergence will be
Proof: The set of differential equations in (14) must
examined solely as a function of physical layer parameters,
satisfy the constraints
which, in turn, determine the extent of rain fading and the
xk ≥ 0, k ∈ K, relevant levels of PER. For instance, in Fig.2 the dependence
 of the routing scheme on the operational frequency f of the
xk = 1
IEEE 802.16 system is examined. The unipath routing effect
k∈K
is established after about 100 path samplings. The algorithm
The critical points of the system are determined by setting converges faster for f =25GHz than for f =20GHz. In the
(14) equal to zero and solving the resulting system of algebraic numerical calculations, a node distance d = 1km has been
equations. At this point, one may assume that A1 < . . . < assumed. The path sampling periods of the figures correspond
Ak < . . . < AK . Then, based on Lemma 1 and taking into to multiples of the S-D round trip time (RTT).
account the constraints previously stated, the unique solution Similar conclusions are obtained from Fig.3, where the
of the system corresponds to the population state vector x∗ = evolution of the population shares is shown for two different
[1 0 0 · · · 0] of dimension K. node distances d. It is observed that the algorithm converges
Substituting x1 = 1−x2 −x3 −· · ·−xK , the previous set of faster for larger values of d. This is attributed to the fact that
differential equations (14) is rewritten in the downsized ver- large values of d result in decorrelation of rain fading over
sion (15), where by X(t) = [X1 (t), . . . , Xk (t), . . . , XK−1 (t)] the various paths. Hence, the differences in the performance
the corresponding downsized population vector of dimen- of the corresponding links are larger and a greater variety
sion (K − 1) is denoted which is almost linear around the between the strategies (routing paths) becomes available; this
equilibrium point X∗ = [0 0 · · · 0]. Then, employing the accelerates the convergence.

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
1222 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 7, SEPTEMBER 2008

 

K

Ẋk = Xk nk1 (1 − Xk ) + Xi · (nki − rk1 ) , k = 2, . . . , K (15)


i=2,i=k

⎡  K ⎤
∂Xk nk1 (1 − Xk ) + i=2,i=k Xi · (nki − rk1 )
qk =⎣ ⎦
∂X
X=X∗
k,  = 2, . . . , K (17)

Fig. 1. MHWBN topology: Five parallel multi-hop paths connecting the source node S to the destination node D.

Fig. 2. Dependence of the speed of convergence of the proposed cross-layer Fig. 4. Dependence of the speed of convergence of the proposed cross-layer
routing algorithm on frequency. routing algorithm on the climatic conditions (f =20GHz).

Finally, the dependence of the speed of convergence on the


climatic conditions of the area where the MHWBN is deployed
is illustrated in Fig.4. In this example, the proposed routing
procedure is applied for two climatic regions: Mediterranean
and Central European. The routing algorithm converges faster
in Central Europe, where rainfall is more intense, leading
to higher attenuation differences among the various paths.
Furthermore, note that in Figs.2-4, the number of agents that
use path 2, although being a strictly dominated strategy (i.e.
vanishes in the long run according to Theorem 1), tends to
increase its share during the first few path samplings, where
Fig. 3. Dependence of the speed of convergence of the proposed cross-layer its payoff is higher than average.
routing algorithm on the node distance (f =20GHz).

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
ANASTASOPOULOS et al.: ADAPTIVE ROUTING STRATEGIES IN IEEE 802.16 MULTI-HOP WIRELESS BACKHAUL NETWORKS 1223

IV. A N I MPROVED S AMPLING A LGORITHM T O


ACCELERATE C ONVERGENCE
A. Algorithm Description
So far it has been assumed that agents select randomly their
routing strategies from the set of available paths connecting
the source to the destination node. In this section, motivated
by the results of the previous convergence analysis, a simple
algorithm to accelerate convergence is presented which takes
advantage of the spatial correlation of the rainfall medium
in wireless channels operating at frequencies above 10GHz.
Actually, this property is exploited by cell-site diversity to Fig. 5. Geometrical definition of the surface sk bounded by the trajectories
mitigate rain fading and increase the availability of broadband of the paths k and .
wireless access networks [20]. The performance of a spatial
diversity scheme depends mainly on the physical separation and time. How a rain field is generated lies outside the scope
between the alternative paths. To achieve maximum reliability of the present paper. Anyway, the physical and mathematical
during data transfer, a new metric, the path correlation coef- basis of the model are well described in [21].
ficient P CCk , is introduced to indicate the overall physical In Fig.6, a snapshot of such a rain field is superimposed
separation between the paths. If sk is the surface defined by over the area of the MHWBN introduced in Fig.1. The next
the trajectories of paths k and  as they link the source node step is the calculation of rain attenuation over each of the
S to the destination node D (see Fig.5), P CCk is defined by alternative paths. To relate rainfall rate to rain attenuation, the
specific rain attenuation γR (in dB/km) [22] is integrated over
P CCk = exp(−sk ) (20) the corresponding path lengths.
If two paths have a large physical separation, the respective Referring again to Fig.6, paths 1, 3, 4 and 5 are strictly
value of the P CC is close to zero. Therefore, a significant dominated (see Theorem 1) by the performance of path 2, that
attenuation difference exists between the two paths with low is, the population of agents following these strategies shrinks
P CC. to zero and all information is routed via the most reliable
To take advantage of this geometrical metric, during rain path 2. Fig.7 demonstrates the convergence acceleration of the
fading, each agent performs the following actions: routing protocol after the application of the PCC algorithm.
It is observed that the lower part of the 10-66GHz frequency
1) First, it selects a routing path k ∈ K at random.
range benefits more when the routing layer is made aware of
2) For every  ∈ K,  = k, the relevant P CCk values are
this additional physical layer information.
evaluated. Given that MHWBNs comprise fixed nodes,
the PCC values may be evaluated a priori and stored at
the network nodes to reduce the computational load. V. C ONCLUDING R EMARKS
3) In the next path sampling period, to decide whether a
possible switching to a new strategy is required, the The release of the IEEE 802.16 WiMAX standard enables
path with the smallest P CCk is examined. If this path the utilization of the 10-66GHz air interface as a wireless
exhibits a lower PER, the agent modifies its strategy backhaul network to aggregate Internet traffic from the access
accordingly. Otherwise, the agent’s strategy k remains points to the Internet backbone. As explained in the main body
unchanged. of the paper, under rain conditions (on average about 5%-
4) The agent repeats Step 3 in the next path sampling 8% of a typical year), routing is dictated by the performance
periods examining the paths with the second, third, aggravation caused by rain fading and not by congestion. This
and so on, smaller P CC, until all alternative paths necessitates a cross-layer analysis where the routing algorithm
available have been sampled without finding a strategy is directly related to the physical link parameters.
outperforming the current one. In the present work, because of the large number of players
It is clear that the PCC based algorithm affects only the with bounded rationality who learn about the network status
sampling probability x of any path . However, from (13), empirically, the concept of EGT is invoked, which seems to
the eigenbalues nk do not depend on x . Hence, even after the reproduce the real situation concerning IP backhaul traffic
application of the PCC algorithm, the eigenvalues of matrix better than conventional game theory. The corresponding evo-
Q remain the same, all having negative values, and Theorem lution of population shares adopting a specific routing strategy
2 holds ensuring evolutionary stability. follows the replicator dynamics model.
Having proven that the proposed EGT based routing scheme
is unipath and evolutionary stable, the speed of convergence
B. Performance Evaluation is investigated. It is shown that convergence is accelerated if
Valuable insight concerning the performance of the pro- more information from the physical layer is transfered to the
posed algorithm to accelerate convergence may be obtained by routing layer. In the particular routing problem under study,
implementing a physical channel tool known as the rain field. convergence acceleration has been achieved by taking into
Rain fields are stochastic models that capture the properties of account the physical separation between the fixed paths of
the rainfall rate R (in mm/h) over a specific area both in space the IEEE 802.16 MHWBN.

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
1224 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 7, SEPTEMBER 2008

Fig. 6. Routing strategies under rain fading for the MHWBN of Fig.1. Snapshot of a rain field model.

To derive (11) and (12), the conditional probability φ(Ak −


A ) = Pr{Ak − A > 0|Ak > 0, A > 0}, which is a function
of two random variables Ak and A , is needed. To this end,
the joint bivariate lognormal distribution is employed, that is
 +∞  Ak
φ(Ak − A ) = dAk dA pAk A (Ak , A ) (22)
0 0

where
 
1 1
pAk A (Ak , A ) = exp − F (Ak , A )
2πSAk SA Ak A 2
(23)
is the joint bivariate lognormal pdf and

1 (ln Ak − ln mAk )2
F (Ak , A ) = 2 −
1 − ρ2n SA k
Fig. 7. Convergence acceleration of the proposed routing algorithm employ-
ing the PCC coefficient method. (ln Ak − ln mAk )(ln A − ln mA )
2ρn +
S Ak S A

ACKNOWLEDGEMENT (ln A − ln mA )2
2 (24)
The authors would like to thank Prof. Athanasios V. SA 
Vasilakos for originally proposing the EGT based routing
approach. A key element of both the original and the improved PCC
routing algorithms is the cross-correlation ρn of rain atten-
uation between the available routing paths. This coefficient
A PPENDIX is obtained according to the methodology described in the
The majority of studies concerning atmospheric propagation Appendix of [24].
above 10GHz agree that rain attenuation A (in dB) and its
underlying physical process of rainfall rate R (in mm/h) are R EFERENCES
well approximated by the lognormal distribution [23] with [1] M. Cao, X. Wang, S.-J. Kim, and M. Madihian, “Multi-hop wireless
probability density function (pdf) backhaul networks: A cross-layer design paradigm,” IEEE J. Select. Areas
  2 
Commun., vol. 25, no. 4, pp. 738-748, May 2007.
1 ln X − mX [2] IEEE 802.16, “IEEE Standard for Local and Metropolitan Area Networks
pX (X) = √ exp − √ X = A or R - Part 16: Air Interface for Fixed Broadband Wireless Access Systems,”
2πSX X 2SX Oct. 2004.
(21) [3] C. Eklund, R.B. Marks, K.L. Stanwood, S. Wang, “IEEE Standard 802.16:
A technical overview of the WirelessMAN air interface for broadband
where mX and SX are the statistical parameters of the wireless access,” IEEE Commun. Mag., vol. 40, no. 6, pp. 98-107, Jun.
lognormal distribution. 2002.

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.
ANASTASOPOULOS et al.: ADAPTIVE ROUTING STRATEGIES IN IEEE 802.16 MULTI-HOP WIRELESS BACKHAUL NETWORKS 1225

[4] R.K. Crane, Propagation Handbook for Wireless Communication System Pantelis-Daniel M. Arapoglou (S’04–M’07) was
Design, CRC Press, 2003. born in Athens, Greece, on October, 1979. He re-
[5] L. Iannone, R. Khalili, K. Salamatian, S. Fdida, “Cross-layer routing in ceived the Diploma degree in electrical and com-
wireless mesh networks,” in 1st Int. Symp. Wirel. Commun. Sys., pp. 319- puter engineering and the Dr. Engineering degree
323, Mauritius, September 20-22, 2004. from the National Technical University of Athens
[6] H.Tangmunarunkit, R. Govindan, S. Shenker, D. Estrin, “The impact of (NTUA), Greece, in 2003 and 2007, respectively.
routing policy on Internet paths,” in Proc. IEEE INFOCOM, vol.2, pp. From January 2004 until December 2005 he was a
736-742, 2001. Research Assistant at the School of Pedagogical and
[7] T. Roughgarden and E. Tardos, “How bad is selfish routing?,” J. ACM, Technological Education (ASPETE). From Septem-
vol. 49, no. 2, pp. 236-259, March 2002. ber 2005, he acted as a technical consultant for
[8] L. Qiu, Y. Richard, Y. Yin Zhang, S. Shenker, “On selfish routing in the Spectrum Management Division of the Hellenic
Internet-like environments,” IEEE/ACM Trans. Networking, vol. 14, no. Ministry of Transport and Communication, where he was involved with the
4, pp. 725-738, Aug. 2006. coordination of the HELLAS-SAT satellite network series. Since August 2007,
[9] J. Nash, “Non-cooperative games,” The Annals of Mathematics, vol. 54, he serves his military duty in the Electronic Warfare Corps of the Hellenic
no. 2, pp. 286-295, 1951. Army.
[10] J. Wardrop, “Some theoretical aspects of road traffic research,” Proceed. His research interests include physical and link layer issues for satellite
Instit. Civil Engineers, PART II, vol. 1, pp. 325-378, 1952. communication and fixed broadband wireless access networks. Dr. Arapoglou
[11] J.W. Weibull, Evolutionary Game Theory, MIT Press, 1996. is a member of the IEEE and of the Technical Chamber of Greece (TEE). In
[12] M.A. Nowak, Evolutionary Dynamics: Exploring the Equations of Life, 2004 he received the ”Ericsson Award of Excellence in Telecommunications”
Harvard University Press, 2006. for his diploma thesis and in 2005 the URSI General Assembly Young
[13] S. Fischer and B. Vöcking, “Evolutionary game theory with applications Scientist Award. He is also an active delegate of Greece in the Study Group
to adaptive routing,” DELIS-TR-0194, Project Number 001907, 2005. 3 of the ITU-R.
[14] P. Taylor and L. Jonker, “Evolutionary stable strategies and game
dynamics,” Mathematical Biosciences, vol. 16, pp. 455-484, 1978.
[15] D. Fudenberg, D.K. Levin, The Theory of Learning in Games, MIT
Press, 1998.
[16] S. Orda, R. Rom, S. Shimkin, “Competitive routing in multiuser Rajgopal Kannan obtained his B.Tech in Com-
communication networks,” IEEE/ACM Trans. Networking, vol. 1, no. 5, puter Science and Engineering from IIT-Bombay
pp. 510-521, Oct. 1993. in 1991 and the Ph.D in Computer Science from
[17] R. J. La, V. Anantharam, “Optimal routing control: Repeated game the University of Denver in 1996. He is currently
approach,” IEEE Trans. Automat. Contr., vol. 47, no. 3, pp. 437-450, an Associate Professor in the Computer Science
March 2002. department at Louisiana State University. His areas
[18] T. Alpcan, T. Basar. R. Tempo, “Randomized algorithms for stability of interest are in algorithmic aspects of wireless
and robustness analysis of high-speed communication networks,” IEEE sensor networks, game and information theory, data
Trans. Neural Networks, vol, 16, no. 5, pp. 1229-1241, Sep. 2005. security, interconnection networks, optical networks
[19] B. Thomas, “On evolutionarily stable sets,” J. Math. Biology, vol. 22, and routing and multicasting protocols. He has
pp. 105-115, 1985. published extensively and won several best-paper
[20] A.D. Panagopoulos, P.-D.M. Arapoglou, G.E. Chatzarakis, J.D. Kanel- awards. He is an Associate Editor of IJAACS and has organized/co-organized
lopoulos, P.G. Cottis, “LMDS diversity systems: A new performance several conferences. His research work has been funded by agencies such as
model incorporating stratified rain,” IEEE Commun. Lett., vol. 9, no. 2, NSF, DARPA, AFRL and DOE.
pp. 145-147. Feb. 2005.
[21] L. Feral, H. Sauvageot, L. Castanet, J. Lemorton, F. Cornet, K. Leconte,
“Large-scale modeling of rain fields from a rain cell deterministic model,”
Radio Sci., vol. 41, no. 2, Apr. 2006.
[22] ITU-R Recommendation P.838-3, Specific attenuation model for rain Panayotis G. Cottis was born in Thessaloniki,
for use in prediction methods, Geneva, Switzerland, 2005. Greece, in 1956. He received the Dipl. Ing. degree
[23] C.-Y. Chu, K.S. Chen, “Effects of rain fading on the efficiency of the in mechanical and electrical engineering and the Dr.
Ka-band LMDS system in the Taiwan area,” IEEE Trans. Veh. Technol., Eng. degree from the National Technical University
vol. 54, no. 1, pp. 9-19, Jan. 2005. of Athens (NTUA), Zografou, Greece, in 1979 and
[24] A.D. Panagopoulos, P.-D.M. Arapoglou, J.D. Kanellopoulos, P.G. Cottis, 1984, respectively, and the M.Sc. degree from the
“Intercell radio interference studies in broadband wireless access net- University of Manchester (UMIST), Manchester,
works,” IEEE Trans. Veh. Technol., vol. 56, no. 1, pp. 3-12, Jan. 2007. U.K., in 1980.
In 1986, he joined the School of Electrical and
Computer Engineering, NTUA, where he is cur-
rently a Professor. From September 2003 to Septem-
ber 2006, he has been the Vice Rector of NTUA. He has published more than
Markos P. Anastasopoulos (S’08) was born in 120 papers in international journals and conference proceedings. His research
Athens, Greece, on February 1982. He received the interests include microwave theory and applications, wave propagation in
Diploma degree in electrical and computer engi- anisotropic media, electromagnetic scattering, powerline and wireless and
neering from the National Technical University of satellite communications.
Athens (NTUA), Zografou, Greece, in 2004 and the
M.Sc. in techno-economics in 2006. He is currently
working toward the Dr. Ing. degree at the same
university. From September 2005, he acted as a
technical consultant for the Spectrum Management
Division of the Hellenic Ministry of Transport and
Communication, where he was involved with the
coordination of the HELLAS-SAT satellite network series.
For his academic progress he has been awarded by the Kyprianides, Eu-
genides and Propondis foundations. His research interests include applications
of game theory in wireless networks, routing and resource allocation issues
for ad-hoc, sensor and satellite networks. Mr. Anastasopoulos is a student
member of the IEEE and of the Technical Chamber of Greece (TEE)

Authorized licensed use limited to: University of Houston. Downloaded on April 20, 2009 at 16:35 from IEEE Xplore. Restrictions apply.

Vous aimerez peut-être aussi