Issue No.12 - Dec. (2012 vol.11)
pp: 2033-2046
Xenofon Fafoutis , Technical University of Denmark, Lyngby
Vasilios A. Siris , Institute of Computer Science (FORTH), Heraklion, and Athens University of Economics and Business, Athens
We consider an environment where self-interested IEEE 802.11 Wireless Local Area Networks (WLANs) have overlapping coverage, and investigate the incentives that can trigger handovers between the WLANs. Our focus is on the incentives for supporting handovers due solely to the improved performance for all wireless networks. Such incentives arise due to a well-known property of 802.11 networks, where low rate users that send traffic significantly degrade the performance of high rate users that are associated with the same access point. A key difference of this paper compared to other works is that WLANs are self-interested, seeking to improve the performance of their own clients. We develop a comprehensive analytical model for accurately identifying and quantifying the handover gains. The model captures cases such as uplink and downlink traffic, wired link capacity constraints, and nonsaturated traffic conditions, and yields a practical handover decision policy. Simulations and experiments on a real testbed verify the accuracy of the model, and indicate that significant gains can be achieved through performance-induced handover incentives.
Throughput, Wireless LAN, Mathematical model, Downlink, Wireless networks, Handover, incentives, Multirate wireless networks, handovers
Xenofon Fafoutis, Vasilios A. Siris, "Handover Incentives for Self-Interested WLANs with Overlapping Coverage", IEEE Transactions on Mobile Computing, vol.11, no. 12, pp. 2033-2046, Dec. 2012, doi:10.1109/TMC.2011.230
[1] M.H. Franck, F. Rousseau, G. Berger-Sabbatel, and A. Duda, “Performance Anomaly of 802.11b,” Proc. IEEE INFOCOM, 2003.
[2] S. Das, H. Viswanathan, and G. Rittenhouse, “Dynamic Load Balancing through Coordinated Scheduling in Packet Data Systems,” Proc. IEEE INFOCOM, 2003.
[3] F. Zdarsky, I. Martinovic, and J. Schmitt, “The Case for Virtualized Wireless Access Networks,” Proc. First Int'l Workshop Self-Organizing Systems, pp. 90-104, 2006.
[4] S. Kandula, K.C.-J. Lin, T. Badirkhanli, and D. Katabi, “FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput,” Proc. Fifth USENIX Symp. Networked Systems Design and Implementation, 2008.
[5] S. Narayanan, P. Liu, and S.S. Panwar, “On the Advantages of Multi-Hop Extentions to the IEEE 802.11 Infrastracture Mode,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2005.
[6] P. Liu, Z. Tao, S. Narayanan, T. Korakis, and S.S. Panwar, “CoopMAC: A Cooperative MAC for Wireless LANs,” IEEE J. Selected Areas Comm., vol. 25, no. 2, pp. 340-354, Feb. 2007.
[7] J.-S. Lue and C.-H.R. Lin, “An Opportunistic Relay Method for Increasing Throughput in Multirate IEEE 802.11 Wireless LAN,” IEICE Trans. Comm., vol. E88-B, no. 6, pp. 2672-2675, 2005.
[8] L.M. Feeney, B. Cetin, D. Hollos, M. Kubisch, S. Mengesha, and H. Karl, “Multi-Rate Relaying for Performance Improvement in IEEE 802.11 WLANs,” Proc. Fifth Int'l Conf. Wired/Wireless Internet Comm. (WWIC), 2007.
[9] P. Bahl, R. Chandra, P.P.C. Lee, V. Misra, J. Padhye, D. Rubenstein, and Y. Yu, “Opportunistic Use of Client Repeaters to Improve Performance of WLANs,” Proc. Fourth ACM Int'l Conf. Emerging Networking EXperiments and Technologies (CoNEXT), 2008.
[10] D. Niyato and E. Hossain, “Dynamics of Network Selection in Heterogeneous Wireless Networks: An Evolutionary Game Approach,” IEEE Trans. Vehicular Technology, vol. 58, no. 4, pp. 2008-2017, May 2009.
[11] L. Chen, “A Distributed Access Point Selection Algorithm Based on No-Regret Learning for Wireless Access Networks,” Proc. IEEE 71st Vehicular Technology Conf. (VTC 2010-Spring), 2010.
[12] A. Argento, M. Cesana, and I. Malanchinii, “On Access Point Association in Wireless Mesh Networks,” Proc. IEEE Int'l Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010.
[13] L. Buttyán and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
[14] J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring, “Modelling Incentives for Collaboration in Mobile Ad Hoc Networks,” Performance Evaluation, vol. 57, no. 4, pp. 427-439, 2004.
[15] S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM, 2003.
[16] L. Anderegg and S. Eidenbenz, “Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents,” Proc. ACM MobiCom, 2003.
[17] S. Buchegger and J.-Y.L. Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness in Dynamic Ad-Hoc NeTworks,” Proc. ACM MobiHoc, 2002.
[18] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, “Self-Management in Chaotic Wireless Deployments: Extended Version,” Wireless Networks, vol. 13, no. 6, pp. 737-755, Dec. 2007.
[19] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, “New Insights from a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs,” IEEE/ACM Trans. Networking, vol. 15, no. 3, pp. 588-601, June 2007.
[20] A. Kumar and V. Kumar, “Optimal Association of Stations and APs in an IEEE 802.11 WLAN,” Proc. Ann. Nat'l Conf. Comm., 2005.
[21] G.S. Kasbekar, J. Kuri, and P. Nuggehalli, “Online Association Policies in IEEE 802.11 WLANs,” Proc. Fourth Int'l Symp. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006.
[22] B. Kauffmann, F. Baccelli, A. Chaintreau, V. Mhatre, K. Papagiannaki, and C. Diot, “Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks,” Proc. IEEE INFOCOM, 2007.
[23] I. Koukoutsidis and V.A. Siris, “Access Point Assignment Algorithms in WLANs Based on Throughput Objectives,” Proc. Sixth Int'l Symp. Modeling and Optimization in Mobile, Ad Hoc and Wireless Network (WiOpt), 2008.
[24] V.A. Siris, G. Stamatakis, and E. Tragos, “A Simple End-to-End Throughput Model for 802.11 Multi-Radio Multi-Rate Wireless Mesh Networks,” IEEE Comm. Letters, vol. 15, no. 5, pp. 635-637, June 2011.
[25] J. Jun, P. Peddabachagari, and M.L. Sichitiu, “Theoretical Maximum Throughput of IEEE 802.11 and Its Applications,” Proc. IEEE Int'l Symp. Network Computing and Application, 2003.
[26] M. Garetto, T. Salonidis, and E.W. Knightly, “Modeling Per-Flow Throughput and Capturing Starvation in CSMA Multi-Hop Wireless Networks,” IEEE/ACM Trans. Networking, vol. 16, no. 4, pp. 864-877, Aug. 2008.