Abstract
In Internet of Things (IoT), there generally exist two typical types of heterogeneous flows with different requirements: inelastic media flow (e.g., the monitoring flow) and elastic data flow (e.g., the environment info from measurement). These heterogeneous flows often coexist for sharing the limited bandwidth. Despite substantial works, a simple yet efficient approach to economically allocate bandwidth for these two types of flows is still not available. In this paper, we propose two methods to optimize the bandwidth allocation of these flows: the network-utility-maximization-based (NUM) method and the asymptotic analysis method. The NUM method provides a general solution to the optimization problem, but requires a certain computational complexity. The asymptotic analysis method delves into the inherent property of the network and explicitly expresses the solution in terms of protocol parameters and traffic requirements. Extensive simulations verify that the two methods are very accurate and can well achieve the desired objectives.
Similar content being viewed by others
References
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Viani F, Robol F, Polo A, Rocca P, Oliveri G, Massa A (2013) Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proc IEEE 101(11):2381–2396
Jiang L, Liu D, BYB (2004) Smart home research. In: Proceedings of 2004 international conference on machine learning and cybernetics, vol 2, pp 659–663
IEEE 802.11ah Task Group, 11/1137r14 Specification Framework for TGah. [Online]. Available: http://www.ieee802.org/11/
Khorov E, Lyakhov A, Krotov A, Guschin A (2015) A survey on IEEE 802.11ah: An enabling networking technology for smart cities. Comput Commun 58:53–69
Lee J.-W., Chiang M, Calderbank AR (2007) Utility-optimal random-access control. IEEE Trans Wirel Commun 6(7):2741–2751
Cheung MH, Mohsenian-Rad H, Wong VW, Schober R (2012) Utility-optimal random access for wireless multimedia networks. IEEE Wireless Commun Lett 1(4):340–343
Yoon D, Lee S, Hong J, Chung K (2013) Weighted bandwidth sharing scheme to guarantee the video quality in home networks. International Conference on Information Networking (ICOIN):423–427
Nassiri M, Heusse M, Duda A (2008) A novel access method for supporting absolute and proportional priorities in 802.11 WLANs. Proceedings of IEEE INFOCOM:709–717
Ma Z, Zhao Q, Luan TH Providing utility-optimal throughput guarantees in wireless LANs, IEEE Transactions on Vehicular Technology, Accepted for publication
Banchs A, Perez X, Qiao D (2003) Providing Throughput Guarantees in IEEE 802.11e Wireless LANs, Proceedings 18th International Teletraffic Cong., pp. 1001–1010
Le Y, Ma L, Cheng W, Cheng X, Chen B (2012) Maximizing throughput when achieving time fairness in multi-rate wireless LANs, 2012 Proceedings IEEE INFOCOM, pp. 2911–2915
Zhong W, Fang Y, Jin S, Wong K, Zhong S, Qian Z (2015) Joint resource allocation for device-to-device communications underlaying uplink MIMO cellular networks. IEEE J Sel Areas Commun 33(1):41–54
Zhong W, Chen G, Jin S, Wong K (2014) Relay selection and discrete power control for cognitive relay networks via potential game. IEEE Trans Signal Process 62(20):5411–5424
Li W, Wang S, Cui Y, Cheng X, Xin R, Al-Rodhaan M, Al-Dhelaan A, et al. (2014) AP association for proportional fairness in multirate WLANs. IEEE/ACM Trans Netw 22(1):191–202
Zhao Q, Tsang D, Sakurai T (2011) A simple critical-load-based CAC scheme for IEEE 802.11 DCF networks. IEEE/ACK Trans Netw 19(5):1485–1498
He S, Chen J, Li X, Shen X, Sun Y (2014) Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans Mob Comput 13(6):1268–1282
Chen J, Xu W, He S, Sun Y, Thulasiraman P, Shen X (2010) Utility-based asynchronous flow control algorithm for wireless sensor networks. IEEE J Select Areas Commun 28(7):1116–1126
Zhang Y, He S, Chen J (2016) Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. ACM/IEEE Trans Netw 24(3):1632–1646
Zhang H, Cheng P, Shi L, Chen J (2016) Optimal DoS attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843–852
Zhao Q, Tsang D, Sakurai T (2010) A novel CAC scheme for homogeneous 802.11 networks. IEEE/ACM Trans Wirel Commun 9(3):1168–1174
Heusse M, Rousseau F, Guillier R, Duda A (2005) Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. ACM SIGCOMM Comput Commun Rev 35(4):121–132
Park CW, Hwang D, Lee T (2014) Enhancement of IEEE 802.11ah MAC for M2M communications. IEEE Commun Lett 18(7):1151–1154
Kumar S, Lim H, Kim H (2015) Hierarchical MAC protocol with multi-channel allocation for enhancing IEEE 802.11ah relay networks, International Wireless Communications and Mobile Computing Conference, pp. 1458–1463
Argyriou A (2015) Power-efficient estimation in IEEE 802.11ah wireless sensor networks with a cooperative relay, IEEE International Conference on Communications, pp. 6755–6760
Amin SM, Wollenberg BF (2005) Toward a smart grid: Power delivery for the 21 st century. IEEE Power Energ Mag 3(3): 34–41
ANSI/IEEE Std 802.11, Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1999 Edition (R2007)
Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Select Areas Commun 18(3):535–547
Malone D, Duffy K, Leith D (2007) Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions. IEEE/ACM Trans Netw 15(1):159–172
Kelly FP, Maulloo AK, Tan DKH (1998) Rate control for commmunication networks: Shadow prices, proportional fairness and stability. J Oper Res Soc 49:237–252
Corlessa RM, Gonnet GH, Hare DEG, Jeffrey DJ, Knuth DE (1996) On the Lambert W function. Adv Comput Math 5:329–359
Wiethoelter S, Emmelmann M, Hoene C, Wolisz A (2006) TKN EDCA Model for NS2, Technische Universitat Berlin, Technical Report. TKN-06-003
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is supported by the Macao Science and Technology Development Fund under Grants 104/2014/A3 and 005/2016/A1.
Appendix
Appendix
In this appendix, we prove Theorem 1.
Proof of Theorem 1
Let \(\varphi ^{o}\triangleq \beta _{2}{\sum }_{j=1}^{m}r_{j}\) represent the total attempt rate of the stations with elastic flows. We prove Theorem 1 in two steps below.
-
Step 1:
Express β i+1 in terms of β 2. From Eqs. 4, 7, and 8, since β i ≪1, we have
$$ r_{i}=\frac{{\Gamma}_{n+i}}{{\Gamma}_{n+1}}=\frac{L_{n+i}\beta_{n+i}(1-\beta _{n+1})}{L_{n+1}\beta_{n+1}(1-\beta_{n+i})}\approx\frac{L_{n+i}\beta_{n+i}} {L_{n+1}\beta_{n+1}}. $$(20)When n = 1, we can express β i+1 as follows
$$ \beta_{i+1}=\frac{r_{i}L_{2}\beta_{2}}{L_{i+1}}=\frac{r_{i}\varphi}{L_{i+1} {\textstyle\sum\nolimits_{j=1}^{m}} \frac{r_{j}}{L_{j+1}}},1\leq i\leq m. $$(21)
-
Step 2:
Express β i in Eq. 16. We first express Γ1 = a 1 as Eq. 22. After substituting (21) into Eq. 22, then we can obtain an explicit relationship between β 1 and β 2, as shown in Eq. 23, where we apply the approximations: β i ≪1 and (1−x)y≈e −xy for x≪y. Combining (21) and (23), we obtain (16).
$$ a_{1}=\frac{L_{i}\beta_{i}{\Pi}_{j\neq i}^{N}(1-\beta_{j})}{(\sigma-T_{c} ){\Pi}_{i=1}^{N}(1-\beta_{i})+\sum\nolimits_{i=1}^{N}({T_{s}^{i}}-T_{c})\beta_{i}{\Pi}_{j\neq i}^{N}(1-\beta_{j})+T_{c}}. $$(22)$$ \beta_{1}=\frac{\sigma-T_{c}+ {\textstyle\sum\nolimits_{i=1}^{m}} (T_{s}^{i+1}-T_{c})\beta_{i+1}+ \frac{T_{c}}{{\Pi}_{i=1}^{m}(1-\beta_{i+1})} }{\frac{L_{1}}{a_{1}}+\sigma-{T_{s}^{1}}} $$(23)$$ \approx\frac{\sigma-T_{c}+\frac{\varphi}{{\textstyle\sum\nolimits_{j=1} ^{m}}\frac{r_{j}}{L_{j+1}}}{\textstyle\sum\nolimits_{i=1}^{m}}(T_{s} ^{i+1}-T_{c})\frac{r_{i}}{L_{i+1}}+T_{c}e^{\varphi}}{\frac{L_{1}}{a_{1} }+\sigma-{T_{s}^{1}}}. $$(24)
-
Step 3:
Compute the optimal φ o, φ. First, we express \({\Sigma }_{i=1}^{N}{\Gamma }_{i}\) as in Eqs. 25 and 26 by applying (21). Second, setting the first-order derivative of \({\Sigma }_{i=1}^{N}{\Gamma }_{i}\) in terms of φ to 0, we obtain the equation of φ, B + T c (e φ−φe φ)=0, and hence \((\varphi -1)e^{\varphi -1}=\frac {B}{T_{c}e}\). Then \(\varphi -1=W_{0}(\frac {B}{T_{c}e})\) or \(W_{-1}(\frac {B}{T_{c}e})\). We have \(\varphi =W_{0}(\frac {B}{T_{c}e})+1\), because \(W_{0}(\frac {B}{T_{c}e})>-1\) and \(W_{-1}(\frac {B}{T_{c}e})<-1\) for \(\frac {B}{T_{c}e}\in (\frac {-1}{e},0)\).
□
Rights and permissions
About this article
Cite this article
Ma, Z., Zhao, Q. & Huang, J. Optimizing bandwidth allocation for heterogeneous traffic in IoT. Peer-to-Peer Netw. Appl. 10, 610–621 (2017). https://doi.org/10.1007/s12083-016-0535-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-016-0535-3