Professional Documents
Culture Documents
I. I NTRODUCTION
2571
T (p)
p
bits/joule.
(2)
(4)
2572
12 2a
1 + 12 + 2a
(9)
n 0,
m 0,
m + n 1.
(10)
n 0,
m + n 1 (11)
where
(2,1)
AF = 2a +
(5)
was adopted to replace the original f (), and it was demonstrated to be reasonable. We will use this formula in our study.
Now, let us analyze the utilities of the users in Fig. 1. Let us
first look at user 1. If p1 is user 1s transmit power, the utility of
user 1 should be
(1,2)
D
T1a
(p1 , m, n) + TAF (p1 , m, n)
U1 (p1 , m, n) =
(6)
p1
AF = 1a +
21 1a
1 + 21 + 1a
(12)
(14)
LW
(1,2)
f (1a )(1)+f AF
M p1
(15)
0,
+ 1.
(16)
(18)
U = Arg max
i
U i >U
i )
(Ui U
(20)
i=1
(21)
1 = (LW/M p1 )f (1a ) and
which is subjected to (1). Here, U
2 = (LW/M p2 )f (2a ) represent the utility of user 1 and
U
user 2 in case of noncooperation, respectively. User i will quit
i , which ensures
cooperation when its utility cannot achieve U
i . A conclusion could
user is utility to be no less than U
be drawn from the above NBS function that the users would
2573
1 =
U1 U
(1,2)
(22)
(23)
(2,1)
LW
M
2
1
(An Em)(Bm F n).
p1 p2
(24)
1
m = ABEF
(AY + F X)
1
n = ABEF (BX + EY ).
(26)
AY + F X 0
EY + BX 0
(27)
(A + E)Y + (B + F )X AB EF.
As depicted in Fig. 2, the triangle represents the points of
(X, Y ) satisfying the restriction given in (27), and we need to
find out the point that maximizes the product XY . Obviously,
the point should be located on line (A + E)Y + (B + F )X =
AB EF such that max(XY ) = max(((B + F )/(A +
E))X 2 + (AB EF/A + E)X). It is easy to derive
that when
AB EF AB EF
(X, Y ) =
,
(28)
2(B + F ) 2(A + E)
XY is maximized, and the cooperation bandwidths are
A
F
+ 2(B+F
m = 2(A+E)
)
E
B
n = 2(A+E) + 2(B+F ) .
(29)
2574
Fig. 4.
f (1a )
f (2a )
1
m
=
1
(1,2)
(2,1)
2
f AF
f AF
(32)
f (1a )
f (2a )
1
n = 2 1 +
.
(1,2)
(2,1)
f AF
f
(
)
f
(
)
1
1a
2a
m = 2 1 (1,2) + (2,1)
f AF
f AF
(30)
1a )
2a )
n = 12 1 + f ((1,2)
f ((2,1)
.
f AF
f AF
(31)
f AF
f (2a )
f (1a )
m = f (2,1) = 1 f (1,2)
AF
AF
(33)
f (1a )
f (2a )
n = (1,2) = 1 (2,1) .
f AF
f AF
Fig. 5.
1 )(U2 U
2 ) versus different locations of user 2.
Value of (U1 U
Fig. 6. Sum utility of the cooperative system with the proposed cooperative
bandwidth allocation strategy versus the fixed noncooperative strategy.
2575
2576
1 )(U2 U
2 ) is found, we take these values of power
of (U1 U
and bandwidth fraction as the optimal parameters.
This approach is based only on a heuristic method. The
performance and complexity may be greatly influenced by
the searching step. How to effectively search for the optimal
transmit power and cooperation bandwidth is interesting work,
which we will leave for future research.
B. Network Implementation
Fig. 8. User utilities with the proposed strategy, where the logarithmic coordinate is adopted on the Y -axis.
1 )(U2 U
2 ) versus different locations of user 2
Fig. 9. Value of (U1 U
with different transmit power.
Obviously, the proposed strategy can also be readily applied to cellular networks, where the base station resembles
the AP and computes cooperation bandwidths and informs
mobiles about the results through signaling channels. On the
other hand, in distributed ad hoc networks, where there is
no central controller, as long as the channel gains for each
transmitterreceiver pair in a three-node subsystem are accessible to both users, our proposed strategy will still be able to work
in a distributed manner. The cooperation bandwidths should be
independently computed by users 1 and 2 by utilizing the same
algorithm.
In a large network where there are more than two users, a
router is supposed to exist in the network, and it can divide
users into pairs based on their geographical locations, e.g.,
grouping the close-by users into pairs and letting each pair
communicate with the nearest AP. If there are odd numbers
of users in the network, one user will be left out, and it has
to work independently. Then, each user pair together with the
AP will build up a subsystem to work cooperatively, just like
we have discussed above. Our proposed strategy can be readily
used in the subsystem. Here, we only present a simple and
heuristic description of the user partitioning problem, and a
lot of implementation issues are left open, which may be very
complex depending on the network scale, routing algorithms,
etc. This can be another interesting topic in our future research.
VII. C ONCLUSION
In this paper, we have analyzed the cooperative behavior of
rational nodes in a wireless network. First, a symmetric system
model comprising two users and an AP is presented, where
each user acts as a source as well as a potential relay in the
system and decides the bandwidth it can use for cooperation.
Then, we proved that this issue can be effectively modeled by
a two-person bargaining problem. With the help of cooperative
game theory, a cooperation bandwidth allocation strategy based
on NBS is proposed. Our strategy can solve the problem of
when to cooperate (cooperation condition) and how to cooperate (cooperation bandwidth). The simulation results show that
users benefit from the proposed strategy in terms of utility,
and the user with longer distance from AP should take more
bandwidth for cooperation when cooperation takes place. As an
extreme, when a user is infinitely far away from the AP, it has
to utilize all its bandwidth to cooperate, having the same result
with that of no cooperation at all, since the other node will not
waste its resource to sacrifice its own utility. In addition, we
also discussed some related issues when putting the proposed
strategy into real application, such as power control and largescale network implementation.
R EFERENCES
[1] J. N. Laneman, G. W. Wornell, and D. N. C. Tse, An efficient protocol
for realizing cooperative diversity in wireless networks, in Proc. IEEE
ISIT, Washington, DC, Jun. 2001, p. 294.
[2] T. E. Hunter and A. Nosratinia, Cooperation diversity through coding,
in Proc. IEEE ISIT, Laussane, Switzerland, Jun. 2002, p. 220.
[3] V. Srivastava, J. Neel, A. B. Mackenzie et al., Using game theory to
analyze wireless ad hoc networks, Commun. Surveys Tuts., vol. 7, no. 4,
pp. 4656, Forth Quarter 2005.
[4] V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, and R. R. Rao, An analytical approach to the study of cooperation in wireless ad hoc networks,
IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 722733, Mar. 2005.
[5] O. Ileri, S.-C. Mau, and N. B. Mandayam, Pricing for enabling forwarding in self-configuring ad hoc networks, IEEE J. Sel. Areas Commun.,
vol. 23, no. 1, pp. 151162, Jan. 2005.
[6] N. Shastry and R. S. Adve, Stimulating cooperative diversity in wireless
ad hoc networks through pricing, in Proc. IEEE ICC, Istanbul, Turkey,
Jun. 2006, pp. 37473752.
[7] D. Grosu, A. T. Chronopoulos, and M.-Y. Leung, Load balancing in distributed systems: An approach using cooperative games, in Proc. IPDPS,
Apr. 2002, pp. 5261.
[8] Z. Han, Z. Ji, and K. J. R. Liu, Fair multiuser channel allocation for
OFDMA networks using Nash bargaining solutions and coalitions, IEEE
Trans. Commun., vol. 53, no. 8, pp. 13661376, Aug. 2005.
[9] Z. Han, T. Himsoon, W. Siriwongpairat, and K. J. R. Liu, Energy efficient
cooperative transmission over multiuser OFDM networks: Who helps
whom and how to cooperate, in Proc. IEEE Wireless Commun. Netw.
Conf., New Orleans, LA, Mar. 2005, vol. 2, pp. 10301035.
[10] R. Mazumdar, L. G. Mason, and C. Douligeris, Fairness in network optimal flow control: Optimality of product forms, IEEE Trans. Commun.,
vol. 39, no. 5, pp. 775782, May 1991.
[11] J. Ji and R. S. Adve, Evaluation of game theoretic approaches to cooperative wireless network design, in Proc. 23rd Biennial Symp. Commun.,
May/Jun. 2006, pp. 7579.
[12] D. Goodman and N. Mandayam, Power control for wireless data, IEEE
Pers. Commun., vol. 7, no. 2, pp. 4854, Apr. 2000.
[13] E. Rasmusen, Games and Information. Oxford, U.K.: Blackwell, 1995.
2577
Peiliang Qiu received the B.S. degree in information and communication engineering from Harbin
Institute of Technology, Harbin, China, in 1967 and
the M.S. degree in information and communication
engineering from the Chinese Academy of Science,
Beijing, China, in 1981.
He is currently a Professor with the Institute
of Information and Communication Engineering,
Zhejiang University, Hangzhou, China. His current
research interests include digital communications,
information theory, and wireless networks.