Professional Documents
Culture Documents
Physical Communication
journal homepage: www.elsevier.com/locate/phycom
Table 1
Notation summary.
Notation Definition
The main notations used in the present paper are where σ 2 is the background noise. Further, γix (k) is the
x
reported in Table 1. These notations will be used gradually path loss between Bxi and user k given by γix (k) = r (Ak)β .
in the following sections. i
Hereafter, we compute the probability S x (k, δ) that the
SINR of a hybrid user k is larger than a threshold δ as in
3.2. Radio model
S x (k, δ) = P(SINRx (k) > δ). Based on the above notations
and according to a previous result obtained in [28], we have
In this section, our goal is to derive the probability dis-
what follows:
tribution of the Signal to Interference plus Noise Ratio
(SINR) of hybrid users in the reference cell. The SINR de- Nx
−δλσ 2
1
pends on the user location in the cell and on its radio con- S x (k, δ) = exp
ditions (described based on path loss and Rayleigh fading γ x (k)P x i =1
δγ x (k)
1 + γ xi (k)
models). We denote by r (k) the distance from user k to Bx0 ,
Nx
while ri (k) represents the distance from interfering Bxi to −δλσ 2 γ x (k)
that same user k. ≈ exp · exp −δ i
. (4)
γ x (k)P x i=1
γ (k)
x
The power received by user k depends on the BS emitted
power and radio channel attenuation, and varies with time As we can see in Eq. (4), the computation of the total
due to fading. In RAT x, let P x be the power emitted by Bx0 . amount of interference involves a discrete sum over all BSs
The received power is then: in RAT x that we denote by I x :
Pr x (k) = P x · γ x (k) · Xk , (1) Nx
γ x (k)
where the random variables Xk are i.i.d. and follow an I x (k) = i
. (5)
exponential distribution of parameter λ as we consider fast i=1
γ x (k)
fading [27]. The path loss for user k, γ x (k), depends on the
Note that I x (k) can only be evaluated numerically.
distance r (k) from Bx0 and is given by:
Therefore, we have recourse to the so-called fluid model
γ x (k) = Ax /r (k)β (2) proposed in [28,29] to propose a tractable formula given
by what follows:
where β is the path loss exponent and Ax a constant
r (k) 2
characterizing the radio propagation in Bx0 . Finally, the SINR (1 − τk,x 2−β ) (τk,x − 1)( RNet )
−β
2π κx ϱx
of user k in RAT x is given by: I (k) =
x
β−2
+
RNet 2−β 4/β
P x · γ x (k) · Xk
SINRx (k) = (3) (τk,x −β−2 − 1)( Rr (Net
k) 4
)
Nx
σ + γ (k)Xi
x + (6)
2
Px
i =1
i 8/β
K. Khawam et al. / Physical Communication 18 (2016) 125–139 129
where τk,x = RRx , ϱx is the density of interfering BSs in temporal fairness and Fair Rate Sharing which insures util-
Net
RAT x and κx is a given constant such as: for WiFi, κS = itarian fairness.
1; whereas for LTE, κP depends on the path loss factor Fair time sharing. All active users are given the same chance
β and has a constant value for a given β ; these values to access resources. Hence, the data rate of user k when
are obtained numerically and given in [28]. Finally, ϱP = assigned to RAT x in the reference cell is the peak rate of
√ 2 and ϱS = RF π(1R )2 where RFx is the frequency user k divided by the number of users associated with the
3 3RFP (RP )
2
S S
reuse factor in RAT x. For LTE, we consider full frequency same RAT x:
reuse (i.e., RFP = 1) [30]. For WiFi, a proper deployment
typically uses three non-overlapping independent chan- χk,x χk,x
nels (i.e., RFS = 3) [31]. Rk,x = nx
= nx
, (8)
1{user i joins RAT x} 1+ 1{user i joins RAT x}
i=1 i̸=k
3.3. Rate model
where,
3.3.1. Peak rate
Modulation and coding constraints result in a discrete 1 if user i joins RAT x
1{user i joins RAT x} = (9)
set of Mx peak rates in RAT x. Let ∆x,j be the jth peak rate 0 otherwise.
realized by a mobile user if its SINR lies within the interval
[δjx , δjx+1 [, j = 1, . . . , Mx (by convention δMx +1 = ∞). The Fair rate sharing. The data rates of all active users are made
peak rate of a user k, denoted by χk,x , is given by what equal. Hence, the data rate of user k when assigned to RAT
follows: x in the reference cell is:
through each RAT so that all users are satisfied. Satisfaction This optimization problem (P ) is introduced hereafter:
for a user is defined here as the minimization of the (P ) : Minimize Ctot (θk , k ∈ H )
cost it perceives subsequent to a given RAT selection. The nS
cost function adopted is an image of service time. As we (1 − θi ) + n + 1
nS
consider elastic traffic, the user satisfaction increases with 1,i̸=k
i=
the perceived throughput [33] or equivalently decreases = × (1 − θk )
χk,P
k=1
with the service time. We denote by Tk,x the mean amount
of time necessary to send a data unit through RAT x, given
by Tk,x = E[1/Rk,x ].
Thus, for the primary RAT in our reference cell (serviced nS
by BP0 ) where we consider fair time sharing, we have the
1 θi
+ + × θk . (15)
following mean data transfer time: χk,S χ
i=1,i̸=k i,S
nS
(1 − θi ) + n + 1
Subject to: 0 ≤ θk ≤ 1, ∀k ∈ H . (16)
i=1,i̸=k
Tk,P = (11) (P ) is a non-linear optimization problem that consists in
χk,P
minimizing the objective function Ctot (θk , k ∈ H ) over the
where θi = E[1{user i joins RAT S } ], and n = nP − nS is the convex polytope { 0 ≤ θk ≤ 1, k = 1, . . . , nS }. The
number of mobile users that are only covered by BP0 . vertices of this polytope correspond to the points where
For the secondary RAT (serviced by BS0 ) where we θk = 0 or θk = 1 for each k = 1, . . . , nS . Theorem 1
consider fair rate sharing, we have the following mean data demonstrates that the optimal solution for Problem (P ) is
always reached on the vertices of the polytope.
transfer time:
nS Theorem 1. An optimal solution to Problem (P ) is reached
1 θi
Tk,S = + . (12) on the vertices of the convex polytope.
χk,S χ
i=1,i̸=k i,S Proof. Suppose that an optimal solution to Problem (P ) is
Therefore, the cost function of a hybrid user k, defined reached for θ̂ = (θ̂k , k ∈ H ). Let us proceed by contradic-
as its expected time necessary to send a unit of data in this tion and suppose that there exists an integer j with 1 ≤ j ≤
heterogeneous environment, is given by the following: nS for which θ̂j ̸∈ {0, 1}. The function Ctot (θj ) := Ctot (θj , θk
Ck = Tk,P × (1 − θk ) + Tk,S × θk . (13) = θ̂k , k ∈ H −{j}) is obtained by taking θk = θ̂k , k ∈ H −{j}
as a linear function of variable θj . Trivially, Ctot (θj ) attains
an optimal value for θj = 0 or θj = 1. Therefore, θ̂j ∈ {0, 1}
4. The optimal RAT selection problem and our proof is completed by contradiction.
Theorem 1 implies that each hybrid user k is either
In the present section, we formulate a centralized ap-
assigned to the primary RAT or to the secondary RAT. Thus,
proach for the RAT selection as a global non-linear op- no load sharing between RATs is required which avoids
timization and analyze its salient properties. Based on expensive repetitive transfers between RATs. In fact, the
these properties, we examine different algorithmic solu- different technologies may have different delays, packet
tions based on an exhaustive search and on a Mixed Integer sizes or coding systems. Hence, reassembling messages
Linear Program (MILP) reformulation. We finally introduce sent via two RATs may be hazardous.
a novel enhanced search algorithm that enables to dras-
tically reduce the computation complexity. We assume 4.2. Algorithmic solutions
the existence of a central entity responsible of routing the
downlink traffic of each user (for instance Base Band Units 4.2.1. Exhaustive search algorithm
in a Cloud-RAN architecture [34]). The central entity may The optimal solution for Problem (P ) can be directly
connect the two RATs to a common core network or di- computed by using an exhaustive search algorithm. How-
rectly to the Internet. ever, the time complexity of an exhaustive search algo-
rithm is exponential in the number of hybrid users nS .
4.1. Problem formulation Indeed, Theorem 1 implies that the optimal solution to
Problem (P ) is obtained on the vertices of the polytope.
The network assigns the traffic of each hybrid mobile Therefore, the objective function Ctot should be evaluated
user among RATs in order to minimize the total network on each of the vertices, corresponding to the points where
cost. In the following, the network cost is computed for θk = 0 or θk = 1 for each i = 1, . . . , nS . The cardinality of
the reference cell, comprising primary and secondary RATs. the set of vertices is given by 2nS , hence the time complex-
This cost denoted by Ctot is defined as the sum of the ity for computing the minimum value of the function over
individual costs of hybrid users and given by: this set is in O (2nS log(2nS )), using for instance a quicksort
algorithm.
nS
Ctot (θk , k ∈ H ) = Ck (θk ) (14) 4.2.2. MILP reformulation
k=1
Problem (P ) is non-linear due to the quadratic terms
where H denotes the set of hybrid users. θk × θi in the objective function Ctot . Yet, following
K. Khawam et al. / Physical Communication 18 (2016) 125–139 131
Finally, the problem (P ) is reformulated into a MILP Accordingly, we compute for any user in zone Zm x
, the
denoted (P ′ ) and given by: SINR within that zone by replacing, in (3), γ x (k) by its
sample average γ̂ x (Zm
x
):
(P ′ ) : Minimize Ctot (θk , zki , k ∈ H , i ∈ H − {k})
Subject to: (17)–(20), (21) Ax rkx
2π r
θk = {0, 1}, ∀k ∈ H . γ̂ (
x x
Zm )= dr . (22)
π (rkx )2 − π (rkx−1 )2 rkx−1 rβ
(P ′ ) is typically solved using a branch-and-bound ap- Our target is to define the above mentioned zones in
proach based on linear-programming. The idea of this ap- x
such a way that users in RAT x, located in zone Zm , are
proach is to solve Linear Program (LP) relaxations of the
most likely to get peak rate χx,m (with a high probability
MILP and to look for an integer solution by branching and e.g. Pth = 0.9). Let us perform the computation neces-
bounding on the decision variables provided by the LP re- sary for localizing users belonging to the first zone, where
laxations. Thus, in a branch-and-bound approach the num- P(SINRx (k) ≥ δ1x ) ≥ Pth (r0x being zero). According to (4)
ber of integer variables determines the size of the search and (6), we get:
tree and influences the execution time of the algorithm. For
large instances of the problem, obtaining an optimal solu- 1 1
F (r (k)) ≤ ln (23)
tion of problem (P ′ ) remains a hurdle. Thus, in the follow- δ1x Pth
ing section, we introduce a novel approach that drastically
reduces the computation time of a solution to the RAT se- where F (r (k)) is a positive increasing function in r (k) such
lection problem. as:
λσ 2 (β + 2)(r (k))β
F (r (k)) = + ϱk,x
5. Cell decomposition 2Ax · PxT
2
r (k)
(τ −β
− 1)
(1 − τk,x ) ,
2−β k x
In this section, we propose to discretize the coverage RNet
× +
area into zones characterized by similar radio conditions, β −2 4/β
in particular similar peak rates, as illustrated in Fig. 2. The
reason behind this decomposition is to make the compu-
r (k)
4
tation tractable. In fact, the interference and the path-loss (τk,x −β−2 − 1) RNet
+ .
factor are different for every user depending on its position 8/β
in the cell. In practical network dimensioning, it is not pos-
sible to use, for each user, exact values for these parameters
but average values among users [35]. Hence, for each RAT Thus, inequality (23) yields r1x = F −1 ( δ1x ln( P1 )). Users
1 th
x, the cell will be logically divided into Mx concentric discs situated at a distance not exceeding r1x from their serving Bx0
132 K. Khawam et al. / Physical Communication 18 (2016) 125–139
perceive the lowest peak rate χx,1 with high probability Pth . denoted by R and Probabilistic Peak Rate Based Algorithm
We conclude that zone Z1x is the disc of radius r1x . Similarly, denoted by PR. These heuristics were introduced in our
we compute the radii delimiting the remaining zones. previous work in [36]. In the present work, the perfor-
mances are thoroughly assessed in static as well as dy-
5.2. Enhanced search algorithm namic scenarios. Recall that for the optimal solution, each
user selects a single RAT. Therefore, our proposed heuris-
As shown in the previous section, a zone in RAT x is tics are built in order to mimic such behavior: each user ex-
defined as the geographical area where users perceive a ploits available signaling information and chooses the best
similar peak rate χk,x . Suitably, the number of zones is low: RAT to connect to. Results show that the proposed algo-
each RAT x offering Mx peak rates leads to a total of MP × rithms give efficient results (in terms of total network cost)
MS possible combinations of primary and secondary peak compared to the optimal centralized algorithm depending
rates. In practice, as the coverage of a WiFi BS is relatively on the spatial users distribution. The two algorithms are
small compared to the primary RAT coverage [26], a hybrid described hereafter. The Peak Rate Based Algorithm R, pre-
user perceives a maximum of two primary peak rates.
sented in Algorithm 1, in which each hybrid user, compares
Thus, the number of zones reduces to 2 × MS which gives
the peak rates provided by the primary and the secondary
16 active zones with WiFi as the secondary RAT. This is
RAT. Then, the hybrid user chooses to connect to the RAT
typically the case when the coverage of a WiFi hotspot
providing the highest peak rate.
is smaller than the difference between the radii of two
successive LTE zones.
Owing to the zone discretization, we introduce an Algorithm 1 Peak Rate Based Algorithm
enhanced search algorithm that computes the optimal Require: Hybrid user k measures peak rates χk,P and χk,S
solution of the RAT selection problem with reduced 1: if χk,P > χk,S then
complexity. Contrary to the exhaustive search algorithm 2: User k connects to primary RAT
that associates a decision variable with each user, the 3: else
enhanced search associates one variable with the set of 4: User k connects to secondary RAT
users in each zone designating the ratio of users associated 5: end if
with the primary RAT. Then, the enhanced search evaluates
the cost function Ctot for each possible ratio. The output
of the algorithm is the optimal ratio of users in each zone Compared to the first heuristic algorithm, the Proba-
associated with each RAT. bilistic Peak Rate Based Algorithm PR, presented in Algo-
Compared to the complexity of the exhaustive search rithm 2, adds uncertainty to the choice made by the hybrid
O (2nS log(2nS )), the enhanced search complexity is in
in user. The probability to connect to a given technology is
O ( i=1 (Ni + 1)), where Nz is the number of users in zone z.
z proportional to the peak rate perceived in it. Particularly,
Thus, the latter remains tractable for a reduced number of we draw a random uniform variable x ∈ [0, χk,P + χk,S ] as
zones, whereas the former has a combinatorial complexity noted in step 1 of the algorithm. Thus, the probability that
χk,P
explosion for a large number of users. For example, if the x is lower than χk,P equals χ +χ , whereas the probabil-
k,P k,S
secondary RAT has a total of 25 users equally distributed χ
k,S
ity that x is greater than χk,P equals χ +χ . The rationale
among 5 zones, the exhaustive search algorithm needs k,P k,S
to compare 225 values of cost function Ctot , whereas the behind this choice is to enable by simple comparisons (x
enhanced search compares only (5 + 1)5 values. greater or lower than χk,P ) to perform a random RAT se-
By virtue of the complexity reduction, we adopt in the lection decision proportional to the ratio of the peak rates.
rest of this document the enhanced search algorithm as the
solution method for the centralized optimal RAT selection Algorithm 2 Probabilistic Peak Rate Based Algorithm
problem. Require: Hybrid user k measures peak rates χk,P and χk,S
1: User k draws uniformly a random variable x ∈
6. Heuristic distributed approach [0, χk,P + χk,S ]
2: if x < χk,P then
Although optimal, the centralized approach presented 3: User k connects to primary RAT
in the previous sections can be costly and resource 4: else
consuming (even for the enhanced search algorithm). 5: User k connects to secondary RAT
From a system design perspective, distributed mechanisms 6: end if
using pre-configured and simple resource allocation rules
are quite appealing. Therefore, in Section 6.1, we propose
two lightweight heuristic distributed algorithms that In practice, in LTE, mobile users measure the channel
approximate the optimal solution. In Section 6.2, extensive quality based on pilots, i.e., Cell-Specific Reference Signals
simulations are conducted to compare the two algorithms (CRS) that are spread across the whole band independently
in static and dynamic scenarios. of the individual users allocation. The peak rate can be
easily inferred from evaluated channel quality. In WiFi,
6.1. Definition of heuristic algorithms the mobile users rely on the beacon frame (sent at least
every 100 ms) to evaluate their performances (through
We propose two distributed heuristic algorithms for their received signal power level) and hence their peak
RAT selection called respectively Peak Rate Based Algorithm rate.
K. Khawam et al. / Physical Communication 18 (2016) 125–139 133
equivalent and that a state of equilibrium is achieved. Fig. 6. General scenario: uniform distribution.
In this case, Fig. 5 shows that R is superior to PR.
In brief, we give the relevant conclusions that stem from In the following simulation results, our goal is to predict
analyzing the specific scenarios: which heuristic algorithm is the most suitable for a given
PR
• When one RAT surrogates the other in terms of peak random scenario. We compute the average R
over 50
rates, hybrid users will largely choose the dominant PR
values for 100 users. We plot as a function of Q for a
R
RAT according to the R algorithm which will deteriorate thousand scenarios in order to observe the pattern they
overall performances. In this case, the PR algorithm generate.
is precious as it balances the load among both We consider two different distributions of users:
technologies.
• Whereas when the two RATs are equivalent in terms of • A Uniform distribution where the coverage area of a WiFi
peak rates, the R algorithm is appropriate as there is no BS is homogeneously occupied by users. For this reason,
risk that hybrid users overcrowd any preferred RAT. In all components of the secondary RAT probability vector
this case, the randomization brought by PR algorithm are the same.
tends to temper the network performances. • A Cluster distribution where users are close to each
other. Since hybrid users have a tendency to gather in
6.2.2. General scenarios groups when accessing web pages, downloading media
content or attending an e-learning course. Thus, all
In the previous section, we studied punctual specific
scenarios that gave us insights into the performances of components of the secondary RAT probability vector,
the R and PR algorithms respectively. What happens then except one, are equal to zero.
when a random scenario is at hand? And how to express For each of the aforementioned user distributions, we plot
such a random scenario? To answer both questions, we PR
R
as a function of Q and analyze the results obtained for
need to model each scenario taking into account the main
100 hybrid users.
characteristics (e.g., the peak rates perceived by users) in
Note that, in the uniform scenario, hybrid users
order to single out the most suitable algorithm.
uniformly span the different available peak rates in the
In order to create such representation or function, we
secondary RAT while they still perceive one or two
need first to pinpoint what defines a given scenario in
possible peak rates in the primary RAT. Extreme Q values
terms of the technologies present in the covered geo-
correspond to the following: very high (low) Q values
graphic area and the distribution of the users relatively
match the case where the majority of users perceive
to each of these technologies. In other words, these pa-
χ much higher (lower) peak rates in the secondary RAT in
rameters are the rate ratios χi,S for i = 1, . . . , MS and
j,P comparison with the primary RAT. In Fig. 6, for low Q
j = 1, . . . , MP perceived by hybrid users from both tech- values, we notice that PR is less costly than R because the
nologies and the probability vectors [p1,x p2,x . . . pMx ,x ] majority of users perceive a higher rate in the primary RAT
introduced earlier for each RAT x. Thus, we introduce a and will all join – according to R – the primary RAT causing
function deemed Q that captures the aforementioned pa- congestion and overall bad performances. Whereas, the
rameters. Q is the expected value of the rate ratios: it is PR load balances the users between both RATs. When the
computed by multiplying the joint probability pi,S × pj,P by primary peak rates start decreasing in the primary RAT in
the corresponding rate ratios as given in the following: comparison with those in the secondary RAT, Q increases
MS
MP leading to a gradual improvement in the performances
χi,S of R until it over-tops PR. This is due to the fact that
Q = pi,S × pj,P × . (24)
i=1 j=1
χj,P the perceived primary peak rates take an intermediary
K. Khawam et al. / Physical Communication 18 (2016) 125–139 135
Fig. 7. General scenario: cluster distribution. Fig. 8. Cumulative cost in dynamic scenarios.
We see that the optimal algorithm with the enhanced compute those particular equilibrium points. Moreover,
search generates the best performances when compared we need to find a realistic distributed algorithm to help
with the heuristics specifically at high load. At moderate non-cooperative end-users learn autonomously those NEs.
to low load, the discrepancy between the heuristics and All those goals were attained in [37] where two search
optimal algorithm is fairly low. Furthermore, we notice algorithms were proposed to characterize NEs of the RAT
that the maximum rate of HO is approximately 1 HO selection game.
every 2 events which is very costly from the operator’s However, in a real environment, the search algorithms
point of view since a HO is an uncharged service that cannot be practically applied. On the one hand, they are
is hard to accomplish. This leads us to the undeniable time consuming and not tractable for real size scenarios.
conclusion that there is no perfect solution but only a On the other hand, they necessitate that every user knows
compromise between the optimal solution and its heavy the strategy of all other users present in the cell. The
HO requirements, and the suboptimal distributed heuristic latter property requires expensive signaling and hinders
algorithms and their very low complexity. the benefits of a distributed resource management policy.
As a consequence, we fall back to replicator dynamics
7. Game theoretic distributed approach algorithm proposed in [39] to learn NEs. With a replicator
dynamics based algorithm, each hybrid user needs only to
To fully assess the relevance of our distributed heuris- be aware of its own cost and strategy at each time iteration.
tics in Section 6, we will compare their performances
against another distributed RAT selection scheme based 7.1. Learning NE: Replicator dynamics
on non-cooperative game theory that we proposed in [37].
Game theory is well adapted to model the interactions be- For clarity, we remind here of the replicator dynamics
tween players competing selfishly for a common resource. based algorithm mechanism as devised in [37]. Players
Initially, the game consists for each end-user in allocating have pure strategies and the devised algorithm will
the traffic among the primary and secondary RATs in a way give the mixed strategies corresponding to a probability
to minimize selfishly its own cost. However, we showed distribution over pure strategies.
in [37] that after convergence, each user is connected to In the present context, this algorithm can be applied
a single RAT which avoids costly traffic splitting between by considering the discrete version of our problem: hybrid
RATs. users have a finite set of strategies, each strategy amounts
For each state of the system, defined by the number of to selecting only one RAT (the special case where θk =
hybrid users nS , we define a multi-player non-cooperative {0, 1}). Therefore, the set of pure strategies of any hybrid
game G between the nS hybrid mobile users present in a user k in the finite game, termed sk , is sk = {S , P } cor-
geographic area covered simultaneously by the primary responding to choosing secondary or primary RAT respec-
RAT and secondary RAT. In this model, there is a sequence tively. The hybrid user gets thereby the following cost:
of one-stage games, each corresponding to a given state
of the system, defined by the number of hybrid users. Tk,P if sk = P
ck = (25)
In [37], the game was static but we have recourse here to Tk,S if sk = S .
a realistic dynamic setting: whenever a new hybrid mobile
Thus, a mixed strategy matches our probability distribu-
is admitted in the system, the game is played again with an
tion (θk , 1 − θk ) on sk .
additional player. Mobile users are assumed to make their
decisions without knowing the decisions of each other. The
Definition 2. The game mechanic works as follows: at t =
formulation of this non-cooperative game G = ⟨N , S , C ⟩
0, we begin with θ (0) = (θ1 (0), . . . , θnS (0)) any random
can be described as follows:
vector of probabilities. At each iteration t > 0:
• A finite set of players: N = (1, . . . , nS ). 1. Each hybrid user k selects the WiFi BS with probability
• The space of pure strategies S formed by the Cartesian θk (t ) which leads to outcome ck (t ).
product of each set of pure strategies S = S1 ×· · ·× SnS .
2. Each hybrid user k updates θk (t ) as follows:
An action of a hybrid user k is the proportion of traffic
θk sent via the secondary RAT. Hence Sk = [0, 1]. The ck (t )
strategy chosen by player k is then θk while θ−k denotes
θk (t ) + b 1 − (1 − θk (t ))
cmax
the set of actions taken by all other players. A strategy
if sk (t )
= S,
profile θ = (θ1 , . . . , θk , . . . , θnS ) specifies the strategies θk (t + 1) = ci (t )
(26)
of all players. θk (t ) − b 1 − θk (t )
• A set of cost functions C = (C1 (θ ), C2 (θ ), . . . , CnS (θ ))
cmax
that quantify players’ costs for a given strategy profile θ if sk (t ) = P ,
where Ck (θ ) for k ∈ N is given by Eq. (13). where 0 < b < 1 is a parameter that controls the
Since for every hybrid user k, Ck is convex w.r.t. θk and convergence rate [40] and cmax is the maximum cost
continuous w.r.t. θi , i ̸= k, a Nash equilibrium exists [38]. perceived by any user in a given RAT.
Proving the existence of the Nash Equilibrium (NE) for
a non-cooperative game is paramount as we need an Proposition 3. For any initial condition where ∀i ∈ N, θi ̸=
equilibrium point to which selfish players are willing to 0 or θi ̸= 1, the considered learning algorithm converges to a
adhere. However, it is far from sufficient, as we need to pure Nash equilibrium.
K. Khawam et al. / Physical Communication 18 (2016) 125–139 137
Table 2
Relative Change in Cost.
Arrival rate PR R Replicator 2
[3] IEEE Standard for Local and Metropolitan Area Networks Part 16: [29] K. Khawam, M. Ibrahim, M. Abdennebi, D. Marinca, S. Tohm,
Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std., Analytical Modelling in 802.11 Ad Hoc Networks, Elsevier, Computer
802.16-2004 standard. Networks, 2011.
[4] S. Sesia, I. Toufik, M. Baker, LTE—The UMTS Long Term Evolution: [30] 3GPP TR 25.814 V7.1.0, Physical Layer Aspects for Evolved Universal
From Theory to Practice, John Wiley & Sons, Ltd., 2009. Terrestrial Radio Access, UTRA, (Release 7), 2006.
[5] J.G. Andrews, S. Buzzi, W. Choi, S.V. Hanly, A. Lozano, A.C.K. Soong,
J.C. Zhang, What will 5G Be, IEEE J. Sel. Areas Commun. 32 (6) (2014). [31] S. Chieochan, E. Hossain, J. Diamond, Channel assignment schemes
[6] ADVA et al., Horizon 2020 Advanced 5G Network Infrastructure for for infrastructure-based 802.11 WLANs: A survey, IEEE Commun.
Future Internet PPP Industry Proposal (Draft Version 2.1), 2013. Surv. Tutor. 12 (1) (2010) 124,136.
[7] METIS D6.6, Final Report on the METIS 5G System Concept and [32] M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, Performance
Technology Roadmap, ICT-317669 METIS Deliverable 6.6, Version 1, anomaly of 802.11b, in: IEEE Infocom, 2003.
April, 2015.
[33] F. Kelly, Charging and rate control for elastic traffic, Eur. Trans.
[8] F. Rebecchi, M. Dias de Amorim, V. Conan, A. Passarella, R. Bruno,
Telecommun. 8 (1) (1997).
M. Conti, Data offloading techniques in cellular networks: A survey,
IEEE Commun. Surv. Tutor. 17 (2) (2014). [34] China Mobile Research Institute, C-RAN: The Road Towards Green
[9] IEEE Standard for Local and Metropolitan Area Networks - Part 21: RAN. White Paper, ver. 2, 2011.
Media Independent Handover, 2009.
[35] T. Bonald, A. Proutire, Wireless Downlink Data Channels: User
[10] K. Taniuchi, et al. IEEE 802.21: Media Independent Handover: Performance and Cell Dimensioning, MobiCom’03, 2003.
Features, Applicability, and Realization, 2009.
[11] D. Kumar, E. Altman, J.-M. Kelif, User-Network Association in a [36] F. Moety, M. Ibrahim, S. Lahoud, K. Khawam, Distributed heuristic
WLAN-UMTS Hybrid Cell: Global & Individual Optimality, INRIA, algorithms for RAT selection in wireless heterogeneous networks,
Rapport de recherche RR-5961, 2006. in: IEEE WCNC, 2012.
[12] E. Stevens-Navarro, Y. Lin, V.W.S. Wong, An MDP-based vertical [37] K. Khawam, M. Ibrahim, J. Cohen, S. Lahoud, S. Tohme, Individual vs.
handoff decision algorithm for heterogeneous wireless networks, global radio resource management in a hybrid broadband network,
IEEE Trans. Veh. Technol. 57 (2) (2008). in: Proc. IEEE Int. Conf. on Communications, ICC, June, 2011.
[13] M. Ibrahim, K. Khawam, S. Tohme, Network-centric joint radio re-
source policy in heterogeneous wimax-umts networks for streaming [38] J.B. Rosen, Existence and uniqueness of equilibrium points for
and elastic traffic, in: IEEE Wireless Communications and Network- concave n-person games, Econometrica 33 (1965).
ing Conference, WCNC, April, 2009. [39] J. Hofbauer, K. Sigmund, Evolutionary game dynamics, Bull. Amer.
[14] G.H. Carvalho, et al. A joint call admission control-based approach Math. Soc. 4 (2003) 479–519.
for initial RAT selection in HetNets, in: International Conference
on Computer, Information and Telecommunication Systems, CITS, [40] D. Barth, O. Bournez, O. Boussaton, J. Cohen, Distributed learning of
2013. wardrop equilibria, in: 7th International Conference on Unconven-
[15] I. Tsompanidis, A. Zahran, C. Sreenan, Towards utility-based resource tional Computation, in: Lecture Notes in Computer Science, 2008.
management in heterogeneous wireless networks, in: MobiArch’12
Proceedings of the Seventh ACM International Workshop on
Mobility in the Evolving Internet Architecture, 2012.
[16] J. Choque, R. Aguero, E.-M. Hortiguela, L. Munoz, Optimum Selection Kinda Khawam got her engineering degree
of Access Networks within Heterogeneous Wireless Environments from Ecole Supérieure des Ingénieurs de Bey-
Based on Linear Programming Techniques, Mobile Networks and routh (ESIB) in 2002, the Master’s degree in com-
Management Lecture Notes of the Institute for Computer Sciences, puter networks from Telecom ParisTech (ENST),
Social Informatics and Telecommunications Engineering, vol. 68, Paris, France, in 2003, and the Ph.D. from the
2011, pp. 135–149. same school in 2006. She was a post doctoral
[17] A. Kumar, R.K. Mallik, R. Schober, A probabilistic approach to fellow researcher in France Telecom, Issy-Les-
modeling users’ network selection in the presence of heterogeneous Moulineau, France in 2007. Actually, she is an
wireless networks, IEEE Trans. Veh. Technol. 63 (7) (2014) 3331, associate professor and researcher at the Uni-
3341. versity of Versailles in France. Her research
[18] O. Eng Hwee, J.Y. Khan, On optimal network selection in a dynamic interests include radio resource management,
multi-RAT environment, IEEE Commun. Lett. 14 (3) (2010) 217–219. modeling and performance evaluation of mobile networks.
[19] L. Pirmez, J.C. Carvalho Jr., F.C. Delicato, F. Protti, L.F.R.C. Carmo, P.F.
Pires, M. Pirmez, SUTIL—Network selection based on utility function
and integer linear programming, Comp. Netw. 54 (2010) 2117–2136. Samer Lahoud received the Ph.D. degree in
[20] D. Kumar, E. Altman, User-network Association in an 802.11 WLAN communication networks from Telecom Bre-
and 3G UMTS Hybrid Cell: Individual Optimality, in: Proceedings of tagne, Rennes. After his Ph.D. degree, he spent
IEEE Sarnoff Symposium, Princeton, USA, 2007. one year at Alcatel-Lucent Bell Labs Europe. In
2007, he joined the University of Rennes 1 as
[21] P. Coucheney, C. Touati, B. Gaujal, Fair and efficient user-network
an assistant professor. His research activities at
association algorithm for multitechnology wireless networks, in:
the IRISA laboratory in Rennes focus on rout-
INFOCOM, 2009.
ing and resource allocation algorithms for wired
[22] S.V. Saboji, C.B. Akki, Congestion-aware proactive vertical handoff
and wireless communication networks. He has
decision using coalition game, Int. J. Soft Comput. Eng. (ISSN: 2231-
co-authored more than 60 papers published in
2307) 1 (6) (2012).
international journals and conference proceed-
[23] K. Radhika, A. Venugopal Reddy, Vertical handoff decision using ings.
game theory approach for multi-mode mobile terminals in next
generation wireless networks, Int. J. Comput. Appl. 36 (11) (2011)
31–37. Marc Ibrahim is an assistant professor at Saint
[24] E. Aryafar, A. Keshavarz-Haddad, M. Wang, C. Mung, RAT selection
Joseph University of Beirut in Lebanon and the
games in HetNets, in: IEEE INFOCOM, 2013.
director of CIMTI (Centre d’Informatique, de
[25] R. Trestian, O. Ormond, G.-M. Muntean, Game theory-based network Modélisation et de Technologies de l’Informa-
selection: Solutions and challenges, IEEE Commun. Surv. Tutor. 14 tion). He got his engineering degree from the
(4) (2012) 1212, 1231. Faculty of Engineering at Saint Joseph University
[26] H. Holma, A. Toskala, LTE for UMTS: OFDMA and SC-FDMA Based in 2002, then his Master’s degree from the same
Radio Access, John Wiley & Sons, 2009. faculty in 2004. In 2009, He received his Ph.D.
[27] B. Sklar, Rayleigh fading channels in mobile digital communication in communication networks from the University
systems, IEEE Commun. Mag. 35 (7) (1997). of Versailles in France. His research activities
[28] M. Ibrahim, K. Khawam, A. Samhat, S. Tohm, Analytical Framework orbit wireless networks with a particular focus
For Dimensioning Hierarchical WiMax-WiFi Networks, Elsevier, on radio resource management and network selection as well as
performance modeling and networks measurement.
Computer Networks, 2009.
K. Khawam et al. / Physical Communication 18 (2016) 125–139 139
Mohamad Yassin obtained his Ph.D. degree in Melhem El Helou received the engineering and
Communication Networks jointly from Univer- master degrees in communications and net-
sity of Rennes 1 in France and Saint Joseph Uni- working from the Ecole Supérieure d’Ingénieurs
versity of Beirut in Lebanon in 2015. He obtained de Beyrouth (ESIB), Faculty of Engineering, Saint
his Engineering Diploma in Telecommunica- Joseph University of Beirut, Beirut, Lebanon, in
tions and Networks from Saint Joseph Univer- 2009 and 2010, respectively, and the Ph.D. de-
sity of Beirut, in 2011 and a Research Master’s in gree in communication networks from IRISA Re-
Telecommunication Networks jointly from the search Institute, University of Rennes 1, Rennes,
Lebanese University and Saint Joseph University France and Saint Joseph University of Beirut, in
of Beirut in 2012. His main research interests 2014. He joined ESIB in September 2013 where
include Software Defined Networks (SDN), Net- he is currently an Assistant Professor. His re-
work Functions Virtualization (NFV), Inter-Cell Interference Coordination search interests include wireless networking, radio access optimization,
(ICIC), Radio Resource Management (RRM), wireless Heterogeneous Net- radio and energy resource management, and quality of service.
works (HetNets) and system-level simulation of mobile networks.
Steven Martin graduated from ESIEE engineer- Farah Moety is currently a post-doctoral fellow
ing school in 2000 and received his Ph.D. degree researcher in Orange Labs, Issy-Les-Moulineaux,
from INRIA, France, in 2004. Since 2005, Steven France. She obtained her Ph.D. in 2014 from
MARTIN is working at Paris-Sud University. His University of Rennes 1, Rennes, France. She was
research interests include quality of service, LTE a member of ATNET research team at IRISA Labs,
networks, network coding, ad hoc networks and Rennes, France. She obtained her Master 2 in
real-time scheduling. Head of research group Telecommunication Networks in 2011 jointly
ROCS - Networking and Optimization - at LRI from Lebanese University (EDST) and Saint-
(Computer Science Laboratory, CNRS/Paris-Sud Joseph University (ESIB) in Lebanon. She has
University), Pr. Martin is involved in many re- done her master thesis at IRISA Labs, Rennes,
search projects and had the lead of the activity France. She received her Telecommunication
‘‘Personal safety in digital cities of the future’’ in EIT ICT Labs (the Euro- and Computer Engineering diploma from Lebanese University — Faculty
pean Institute of Innovation and Technology) from 2010 to 2014. He is of Engineering III in 2010, Beirut, Lebanon. Her research interests include
the author of a large number of papers published in leading conference green wireless access networks, radio resource allocation, heterogeneous
proceedings and journals. He has served as TPC member for many inter- networks, LTE networks, WLANs, network optimization, radio access
national conferences in networking. technology selection.