major project report 7th sem09eeg17

Upload: kob265

Post on 03-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    1/42

    OPTIMIZATION OF DELAY AND MAXIMIZATION OF AVERAGE

    REVENUE SUBJECTED TO MINIMUM BANDWIDTH CONSTRAINT

    IN WIRELESS COMMUNICATION MESH NETWORKS

    Major Project-I Report

    Submitted in partial fulfilment of the requirements for the award of the degree

    BACHELOR OF TECHNOLOGY

    IN

    ELECTRICAL AND ELECTRONICS ENGINEERING

    BY

    ABHISHEK VERMA (09EE03)

    CHIRAG MAHAPATRA (09EE30)

    JITESH AGARWAL (09EE42)

    MANTHAN PANCHOLI (09EE65)

    ROHAN GUPTA (09EE79)

    Under the guidance of

    Dr. ASHVINI CHATURVEDI

    DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING

    NATIONAL INSTITUTE OF TECHNOLOGY KARNATAKA, SURATHKAL

    SRINIVASNAGAR-575025, KARNATAKA, INDIADECEMBER, 2012

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    2/42

    DECLARATION

    We hereby declare that the project work report entitled Optimization of Delay and

    Maximization of Average Revenue Subjected to Minimum Bandwidth Constraint inWireless Communication Mesh Networks which is being submitted to the National

    Institute of Technology Karnataka, Surathkalfor the award of the Degree of Bachelor of

    Technology in Electrical and Electronics Engineering is a bonafide report of the work

    carried out by us. The material contained in this report has not been submitted to any

    university or institution for the award of any degree.

    SI. NO. NAME ROLL NO. Signature

    1 AbhishekVerma 09EE03

    2 Chirag Mahapatra 09EE30

    3 Jitesh Agarwal 09EE42

    4 Manthan Pancholi 09EE65

    5 Rohan Gupta 09EE79

    Department of Electrical and Electronics Engineering

    PLACE : NITK, SURATHKAL

    DATE : 4th

    December, 2012

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    3/42

    CERTIFICATE

    This is to certify that the B-tech project work report entitled Optimization of Delay and

    Maximization of Average Revenue subjected to minimum bandwidth constraint inWireless Communication Mesh Networks submitted by:

    SI. NO. NAME ROLL NO.

    1 Abhishek Verma 09EE03

    2 Chirag Mahapatra 09EE30

    3 Jitesh Agarwal 09EE42

    4 Manthan Pancholi 09EE65

    5 Rohan Gupta 09EE79

    As the record of the work carried out by them, is accepted as the B-Tech. Project Work

    Report Submission, in partial fulfilment of the requirements for the award of Degree of

    Bachelor of Technology in Electrical and Electronics Engineering.

    Dr. ASHVINI CHATURVEDI

    Project Guide,

    Department of Electrical and Electronics Engineering,

    National Institute of Technology Karnataka, Surathkal

    Dr. K.P VITTAL

    Head of the Department,

    Department of Electrical and Electronics Engineering,

    National Institute of Technology Karnataka, Surathkal

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    4/42

    ACKNOWLEDGEMENT

    The extensive endeavour, bliss and euphoria to accomplish the task certainly would not have

    been realized without the expression and gratitude of people who made it possible. We takethis opportunity to acknowledge all those whose support and encouragement has helped us in

    tuning this project.

    We are grateful to our guide, Dr. Ashvini Chaturvedi, department of Electrical and

    Electronics Engineering for not only providing us opportunity to showcase but also all

    facilities and experience in the completion of this project. He bestowed his guidance at

    appropriate times without which it would have been very difficult for us to complete the

    project. An assemblage of this nature could never have been attempted without the support of

    our guide.Our thanks are also due to Prof. K.P. Vittal, the head of the Electrical and Electronics

    department who has allowed us use of the facilities at the department.

    Abhishek Verma (09EE03)

    Chirag Mahapatra (09EE30)

    Jitesh Agarwal (09EE42)

    Manthan Pancholi (09EE65)

    Rohan Gupta (09EE79)

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    5/42

    INDEX

    Serial No Topic Page No.

    1. Abstract 1

    2. Introduction 1

    3. Motivation 2

    4. Literature Survey 2

    Paper 1: WiFi access point pricing as a dynamic game.by J. Musacchio andJ. Walrand.

    Paper 2: Market Models and Pricing Mechanisms in a Multihop Wireless

    Hotspot Network. by Kai Chen, Zhenyu Yang, Christian Wagener, Klara

    Nahrstedt

    Paper 3: Efficient multicast routing with delay constraints., by G. Fengand

    T.S.P. Yum, International Journal of Communication Systems

    Paper 4: A Delay-Constrained Shortest Path Algorithm for Multicast Routingin Multimedia Applications. by M.F. Mokbel, W.A. El-Haweet, M.N. El-

    Derini

    5. Part A 8

    6. Part B 15

    7. Appendix I 22

    8. Appendix II 31

    9. Reference 37

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    6/42

    1 | P a g e

    ABSTRACT

    The development of wireless LAN technologies offers a novel platform for internet service

    resale via wireless community mesh networks that provide high network coverage and lower

    infrastructure cost. In a wireless community mesh network, access point functions as both theInternet service provider and Internet access provider to the mesh network neighbours (end-

    users) since the upstream Internet service providers of the access point is not able to monitor

    and bill for the resold traffic within the community mesh network. In this Internet service

    resale business, the access provider sets their pricing policy as an Internet reseller to

    maximize its revenue, while the end-users who are price sensitive, respond to this pricing

    policy by controlling their Internet usage. Using a queuing theory model, we propose an

    optimal pricing model to achieve revenue maximization for a mesh network access provider.

    The users sensitivity to the price is modelled in order to discover the optimal price. The

    effects of the price on the traffic load and the maximum number of users at the access point

    are explored since price is viewed as an additional strategy to encourage a better usage of the

    limited bandwidth resource. Monte Carlo simulation results are presented to verify the

    analytically optimal price based on the proposed pricing model.

    Another key aspect of wireless mesh networks is the scope of multicast routing. This is when

    there is a single source and multiple receivers. This is advantageous when multimedia

    applications like videoconferencing and remote collaboration is used. Solving an optimal

    multicast tree is an NP problem i.e. it cannot be done in polynomial time. Hence, we can try

    to get an approximate solution using heuristics. There are two key ways of optimizing one:

    via minimizing the cost, two: via minimizing the delay. Both these methods are not optimal

    since there is an upper threshold to the delay incurred in the network and the cost cannot be

    prohibitively high. Here, we propose an optimal solution in O(n

    2

    ) time.

    INTRODUCTION

    The low-cost wireless mesh network (WMN) technology induces the expanding of wireless

    community mesh networks or WMNs. It is viewed as an opportunity to expand markets for

    telecommunication services to empower local communities and to expand economic capacity

    and commerce in rural areas. Internet access is one of the most common applications of

    WMNs. A WMN interconnects stationary and / or mobile users and provides internet access

    as well as communications within the network. The nodes connected to the Internet are called

    access points (APs). In the WMN, the objectives of most end-users would be to access the

    Internet at a reasonable cost. In this sense, APs are Internet access providers who also resellInternet services to end-users within the WMN. The upstream Internet service providers

    (ISPs) will not be able to monitor resold traffic within the WMN in order to bill the end-

    users. The APs set the pricing policy to generate revenue to cover their costs and maximize

    their profit. For the end-users as buyers of resold Internet services, each end-user derives

    some value from accessing and using the Internet, based on the APs pricing policy. Each

    end-users willingness to pay for the Internet service is dependent on their perceived need for

    the access. Hence, it is important to analyze the end-usersbehaviour when a pricing strategy

    is investigated to maximize revenue for an AP provider Quality of service (QoS) is another

    aspect that affects the end-users usage behaviour. As the WMN expands, the AP whose

    uplink has a limited data capacity will inevitably result in the end-users having to face traffic

    congestion at the AP node. In general, congestion control is especially important for best-effort services, since there is no congestion avoidance mechanisms implemented in the

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    7/42

    2 | P a g e

    network. Pricing is widely viewed as a mechanism to give users incentives to use the network

    efficiently or a means for network usage control. Using price, the network could send signals

    to the users, providing them with incentives that influence their usage behaviour and

    decisions. By these means, APs can provide a better and more stable service to end-users.

    MOTIVATION

    In this project, we will investigate how price impacts the end-users traffic and the system

    utilization at the AP node. We model a typical mesh network in which there is a single AP

    providing Internet connectivity and services to the end-user nodes, as an M/M/1/S queue

    system. The M/M/1/S is a special type of Markovian system, where customers arrive

    according to a Poisson process and are served by a single server with an exponential service-

    time distribution. The system can accommodate only S maximum customers simultaneously.

    In this model, as long as the end-user accepts the price charged by the AP and there is room

    in the queuing system, the end-user is served and the AP earns the revenue based on the end-

    users usage. The end-users demand is modelled as a function of the service price. The

    utility function is an important concept which is widely used in literature to give a measure of

    the users sensitivity to the price and their perceived QoS level. For the general case of

    Internet provision, when ISPs offers a service at a particular price to the users, these users

    will respond to this price by changing their usage to maximize their utility. From an

    economic point of view, the utility function is strictly related to the users demand curve,

    which is associated to the users willingness-to-pay and their perceived QoS level. Since it is

    difficult to find direct knowledge of users utility function, we will model these dependences

    in our analytical pricing model instead of using a utility function to represent the end- users

    demand. If the price charged by the AP is out of the range of the end-users willingness to

    pay, the end-user is likely to decrease their Internet usage. It is evident that there is a trade-off

    between the price and the amount of end-users Internet usage. A lower price attracts moreend-users with large demands but yields less revenue per end-user, while a higher price yields

    more revenue per end-user but might discourage more end-users from using the service. In

    this project, an optimal pricing model to maximize the APs revenue based on the end -users

    behaviour model is presented. In this pricing model, the traffic intensity, the end-users

    willingness to pay and the QoS metric are taken into account to develop the optimal pricing

    algorithm. The proposed pricing scheme can determine an optimal price in order to maximize

    the revenue, while maintaining the traffic intensity and the maximum of end-users, S, at the

    AP to a reasonable level. Further, we focus on usage-based pricing. Usage-based pricing is

    incentive compatible since it encourages customers to use network resources more efficiently.

    Customers are willing to pay an additional per-usage charge in order to improve the network

    performance (QoS charge) and to avoid the performance degradation due to the networkcongestion. However, our objective is to investigate the effects of the end-users willingness-

    to-pay on the optimal price that maximizes the APs revenue for a finite capacity system.

    LITERATURE SURVEY

    Paper 1: WiFi access point pricing as a dynamic game.by J. Musacchio and J.

    Walrand.

    Abstract

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    8/42

    3 | P a g e

    This paper studies the economic interest of a wireless access point owner and his paying

    client, and models their interaction as a dynamic game. The key feature of this game is that

    the players have asymmetric informationthe client knows more than the access provider.

    From the paper it can be inferred that if a client has a web browser utility function (a

    temporal utility function that grows linearly), it is a Nash equilibrium for the provider tocharge the client a constant price per unit time. On the other hand, if the client has a file

    transferor utility function (a utility function that is a step function), the client would be

    unwilling to pay until the final time slot of the file transfer. It also studies an expanded game

    where an access point sells to a reseller, which in turn sells to a mobile client and show that if

    the client has a web browser utility function, that constant price is a Nash equilibrium of the

    three player game. Finally, it states a two player game in which the access point does not

    know whether he faces a web browser or file transfer or type client, and show conditions for

    which it is not a Nash equilibrium for the access point to maintain a constant price.

    Introduction

    Today there is a large and growing number of wireless access points deployed by homes and

    businesses for private LANs. Many of these access points could potentially be used to

    provide Internet access to users from the general public that lie or are passing within

    communication range of the access point. However, owners of private WiFi networks often

    choose to encrypt their networks to prevent outsiders from accessing them. Without a

    mechanism for a potential client to compensate the owner of the network, the network owner

    has no reason to accept the increased network traffic and security risk that would come from

    allowing the public to access his network. If it were possible to provide incentives to owners

    of existing private wireless access points to open their networks to the public, as well as

    provide incentives to people and institutions to deploy access points where there are gaps in

    coverage, the result might be nearly ubiquitous WiFi coverage. In contrast to cellular phone

    networks deployed by a few large providers, this ubiquitous access network would be

    deployed by thousands, perhaps millions, of autonomous self-interested agents.

    Conclusion

    We have seen that if the client is a web browser, with a utility function that grows linearly

    with connection duration, it is a PBE for the access point to charge a constant price in each

    time slot. Though the value of the price charged depends on U (utility per slot), the fact that

    constant price is a PBE is true for any distributions of type variables Uand (the intended

    session length) so long as Uand are finite-mean and independent. The result even extendsto a multi-hop case where an access point sells to a reseller which in turn sells to a client.

    These results suggest that if a client has a web browsing utility function, that we could expect

    an access point to charge constant price without third party supervision, and without the need

    for contracts. An architecture based on micropayments would likely lead to a functioning

    market. However, if the client has a file transferor utility, where utility has a step with respect

    to time, then the access point price is not constant in PBE. Furthermore, when the file length

    has a bounded distribution, clients are pessimistic, and the PBE can be very inefficient in

    terms of social welfare. The access point prices are not constant even when there is only a

    small probability of the client being a file transferor, as we saw in the Bayesian Model. When

    the Bayesian Model is modified for clients that have an unbounded intended session length, it

    remains true that prices are not constant, and furthermore it is not a PBE for the access pointto charge reasonable prices in every slot. Where a reasonableprice is one in which there

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    9/42

    4 | P a g e

    is a nonzero probability of the clientsone slot utility exceeding it. Despite the disappointing

    properties of the equilibria in the file transferor cases, the direct charging model is viable, if

    the granularity of the slots is chosen judiciously. For one reason, the web browsing model is a

    more realistic representation of a typical clients utility. Most mobile users are probably

    interested in browsing the web, using e-mail, or perhaps downloading small files. As long as

    the e-mail spool or small files can be downloaded in less than one slot, then the stepdiscontinuities in client utility disappear when looked at using the discrete time scale of the

    game. However, the slot size should not be made too large, because the client might not feel

    comfortable paying in advance for a large block of time. From a game theory perspective, an

    access point with marginal cost per slot would be tempted to take a slot payment and then not

    serve the client. With any choice of time slot length, users will on occasion download files

    that take longer than one time slot to complete. To address this issue the file transfer software

    that already exists today that allow clients to resume an interrupted file transfer at some later

    time must be used. A client using such software does get partial utility for partial files, and

    thus her utility function would look more like that of our web-browser model than of our file

    transferor model.

    Paper 2: Market Models and Pricing Mechanisms in a Multihop Wireless Hotspot

    Network. by Kai Chen, Zhenyu Yang, Christian Wagener, Klara Nahrstedt.

    Abstract

    Multihop wireless hotspot network has been recently proposed to extend the coverage area of

    a base station. However, with selfish node in the network, multihop packet forwarding cannot

    take place without an incentive mechanism. In this paper, we adopt the pay for service

    incentive model. i.e., clients pay the relaying nodes for their packet forwarding service. Ourfocus in this paper is to determine a fair pricing for packet forwarding. To this end, we

    model the system as a market where the pricing for packet forwarding is determined by

    demand and supply. Depending on the network communication scenario, the market models

    are different. We classify the network into four different scenarios and propose different

    pricing mechanisms for them. Our simulation results show that the pricing mechanisms are

    able to guide the market into an equilibrium state quickly. We also show that maintaining

    communication among the relaying nodes is important to achieve a stable market pricing.

    Introduction

    We consider a multihop hotspot network. In this architecture, a mobile client may not be ableto reach the base station (BS) via single hop direct communication. Instead, the client must

    rely on another node which is closer to the BS to forward its packets. Such nodes are called

    the relaying nodes (RN). This is the multihop wireless hotspot network. Compared to the

    traditional single-hop hotspot network where every node communicates directly to the BS, a

    multihop hotspot network offers a few advantages. First, it extends the coverage of the BS to

    a larger area, which is helpful especially when installing additional BS is not possible due to

    real property restrictions. Second, it may increase the throughput of a client who receives

    very bad signal from the BS, while a nearby relaying node has much better wireless signal

    quality. This situation is possible considering the irregular signal propagation property in a

    physical environment with partitions and obstacles. Finally, by multihop forwarding, a client

    does not need to have subscription to the BS to use its service. This is helpful when a clientroams outside its own hotspot ISPs service area. In this paper, the authors focus on providing

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    10/42

    5 | P a g e

    incentive for packet forwarding in a two-hop hotspot network. Since packet forwarding

    consumes a RNs resources such as bandwidth and energy, aselfish RN would not be willing

    to forward others packets without an incentive mechanism. In this paper, they adopt the pay

    for service incentive model, i.e., clients pay the RNs to forward their packets. In human

    society, monetary rewards are often given for providing service. Here, packet forwarding can

    be considered as RNs service to the clients, considering the fact that the RNs are ownedand controlled by human users. This paper focuses on determining a fair pricing for the

    packet forwarding service in this network. The system is modelled as a market where the

    pricing for packet forwarding is determined by demand and supply. The RNs compete for

    clients traffic; clients can choose a RN who can offer a better price, similar to 2 in a

    multiple-buyer multiple-seller market. Its difference with the conventional market is that the

    communication scenarios in this network can be very complex, leading to different market

    structures. The market structure in this network depends on the number of RNs, the

    communication among the RNs, and the reachability of the clients to the RNs. For example,

    if there is only one single RN in the network, the RN becomes a monopolist who has unique

    pricing power. Therefore, the RN can probe the client(s) with different prices to maximize its

    profit. However, if there are multiple RNs, such pricing power is rather limited. Instead, theRNs have to compete with each other by undercutting each others price. The authors classify

    the network into four different scenarios and propose different pricing mechanisms for them.

    They have introduced a hill-climbing algorithm for a monopoly market (i.e. single RN in the

    network), and a second lowest marginal cost pricing mechanism for a market with multiple

    RNs and perfect reachability. We further extend these basic network scenarios to cover a

    situation where a client can only reach a subset of the relaying nodes, and another situation

    where the relaying nodes do not have communication among them.

    Conclusion

    In this paper, the focus is on the packet forwarding incentive problem in a two-hop wireless

    hotspot network. The authors adopt the credit (or micro-payment) based incentive approach,

    i.e., the clients pay the relaying nodes for their packet forwarding service. The system is

    modelled as a market where the pricing for packet forwarding is determined by demand and

    supply. The network is classified into four different scenarios, and different pricing solutions

    are proposed for each of them. In particular, hill-climbing algorithms is designed for a

    monopoly market, and introduce a VCG-like second lowest marginal cost pricing mechanism

    for a market with multiple relaying nodes which guarantees truthful reporting of marginal

    costs. The work is further extended the network scenarios to cover the situation where a client

    can only reach a subset of the relaying nodes, and another situation where the relaying nodes

    do not have communication among them. The simulation results show that the pricingmechanisms are able to guide the market into an equilibrium state quickly. The analysis in

    this paper underscores the importance of keeping communication among the relaying nodes,

    therefore, the base station should be encouraged to act as intermediate to reliably relay

    pricing messages among them.

    Paper 3: G. Fengand T.S.P. Yum, Efficient multicast routing with delay constraints.,

    International Journal of Communication Systems

    Abstract

    To support real-time multimedia applications in BISDN networks, QoS guaranteed multicastrouting is essential. Traditional multicast routing algorithms used for solving the Steiner tree

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    11/42

    6 | P a g e

    problem cannot be used in this scenario, because QoS constraints on links are not considered.

    In this paper, we present two efficient source-based multicast routing algorithms in directed

    networks. The objective of the routing algorithms is to minimize the multicast tree cost while

    maintaining a bound on delay. Simulation results show that these two heuristics can greatly

    improve the multicast tree cost measure in comparison with the shortest path routing

    schemes. Their performance is close to that of the known CST algorithm proposed byKompell et al., but requiring a much shorter computation time.

    Introduction

    Multimedia applications such as videoconferencing and remote collaboration rely on the

    ability of the network to provide multicasting communication. Multimedia traffic consists of

    audio and video that consume large bandwidth and require a certain quality-of-service (QoS)

    when transferred through networks. Hence efficient multicast routing algorithms which are

    capable of constructing low-cost multicast trees that satisfy the constraints imposed by the

    QoS requirements are essential for real-time multimedia services. Current multicast routing

    protocols, such as PIM,2 DVMRP,3 are based on simple algorithms: shortest pathmulticasting and reverse path multicasting. These multicast algorithms usually assume simply

    additive cost metric.

    Algorithms for constructing multicast trees have been developed with two optimization goals.

    The "rst is the minimum average path delay, which is the average of the minimum path delay

    from the source to each of the destinations in the multicast group. This can be done in O(n2)

    time using Dijkstra's shortest path algorithm,4 where n is the number of nodes in the graph.

    The second goal is to minimize the cost of the multicast tree, which is the sum of the cost on

    the edges in the multicast tree. The least cost tree is called a Steiner tree, and the problem of

    finding a Steiner tree is known to be NP-complete.4 Many heuristics for low-cost multicast

    routes take O(n3) to O(n4) time5,6 and can produce solutions that are within twice the cost of

    the optimal solution.

    Conclusion

    The planning and running of multimedia applications in BISDN require an efficient multicast

    protocol. We have presented two efficient multicast routing algorithms that can produce good

    solutions and scale to large size networks. Algorithm A is very simple and is suitable for

    static multicast connection requests, while Algorithm B allows the tuning of the tree cost by

    the run time and can support multicasting dynamics. These two properties are important for

    multiparty conferencing applications where the setup speed of multicast connection is critical

    and the multicast group is dynamic. The performance of Algorithm B is found to be veryclose to that of CST but at a much lower time complexity.

    Paper 4: A Delay-Constrained Shortest Path Algorithm for Multicast Routing in

    Multimedia Applications. by M.F. Mokbel, W.A. El-Haweet, M.N. El-Derini

    Abstract

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia

    and real-time applications. The tree is used to concurrently transmit packets from

    source to multiple destinations such that exactly one copy of any packet traverses the

    links of the multicast tree. Since multimedia applications require some Quality ofService, QoS, a multicast tree is needed to satisfy two main goals, the minimum path

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    12/42

    7 | P a g e

    cost from source to each destination (Shortest Path Tree) and a certain end-to-end delay

    constraint from source to each destination. This problem is known to be NP-Complete.

    The proposed heuristic algorithm solves this problem in polynomial time and gives near

    optimal tree. We first mention some related work in this area then we formalize the

    problem and introduce the new algorithm with its pseudo code and the proof of its

    complexity and its correctness by showing that it always finds a feasible tree if one exists.Other heuristic algorithms are examined and compared with the proposed algorithm via

    simulation.

    Introduction

    Handling group communication is a key requirement for numerous applications that have

    one source sends the same information concurrently to multiple destinations. Multicast

    routing refers to the construction of a tree rooted at the source and spanning all

    destinations. Generally, there are two types of such a tree, the Steiner tree and the shortest

    path tree. Steiner tree or group-shared tree tends to minimize the total cost of the

    resulting tree, this is anNP-Complete problem, number of heuristics to this problem can be found in Shortest

    path tree or source-based trees tends to minimize the cost of each path from source to any

    destination, this can be achieved in polynomial time by using one of the two famous

    algorithms of Bellman and Dijkstra and pruning the undesired links. Recently, with the

    rapid evolution of multimedia and real-time applications like audio/video conferencing,

    interactive distributed games and real-time remote control system, certain QoS need to be

    guaranteed in the resulted tree. One such QoS, and the most important one, is the end-to-

    end delay between source and each destination, where the information must be sent

    within a certain delay constraint D. By adding this constraint to the original problem of

    multicast routing, the problem is reformulated and the multicast tree should be either delay

    constrained Steiner tree, or delay-constrained shortest path tree. Delay constrained Steiner

    tree is an NP-Complete problem, several heuristics are introduced for this problem each

    trying to get near optimal tree cost, without regarding to the cost of each individual path for

    each destination. Delay-constrained shortest path tree is also an NP-Complete problem.

    An optimal algorithm for this problem is presented, but its execution time is

    exponential and used only for comparison with other algorithms. Heuristic for this

    problem is presented, which tries to get a near optimal tree from the point of view of

    each destination without regarding the total cost of the tree. An exhaustive comparison

    between the previous heuristics for the two problems can be found. In this paper we

    investigate the problem of delay constrained shortest path tree since it is appropriate in

    some applications like Video on Demand (VoD), where the multicast group has afrequent change, and every user wants to get his information in the lowest possible

    cost for him without regarding the total cost of the routing tree. Also shortest path tree

    always gives average cost per destination less than Steiner tree.

    Conclusion

    In this paper we propose a polynomial time heuristic algorithm that computes the

    shortest path tree with delay constraint. The algorithm has a running time O(K2N2)

    whereK is a variable adjusted from 1 to N and N is the number of nodes in the

    network. Simulation experiments have been done to compare the efficiency of the new

    algorithm with other previous algorithms and with the optimal results. Empirical resultsshow that our algorithm is always dominating previous algorithms and gives optimal

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    13/42

    8 | P a g e

    results with certain value of K. Simulations are also done to determine the appropriate

    value of K that gives the optimal result. It is clear that a small value ofK could be enough

    which makes the running time of the algorithm near O(N2). The work in this algorithm

    can be extended in three ways. Firstly, a distributed version of this algorithm could be

    introduced by limiting the data kept in each node. Secondly, the dynamic change of

    group members should be considered to be embedded on the algorithm and not to start thealgorithm from the beginning. Finally, this algorithm should be incorporated in an

    appropriate protocol to be used in real networks.

    PART APROPOSED APPROACH

    In reported work, an Optimal Pricing Model for Wireless Community Mesh Networks is

    implemented. Firstly, the network comprising of a single access provider and multiple users

    is designed using M/M/1 queuing theory and then using probability theory the blocking

    probability is defined. The blocking probability is used as an indicator minimum bandwidthto determine the limitation for the value of blocking probability. The average revenue of theaccess provider is maximized subject to certain constraints controlled by QoS and the optimal

    price is found. The analytical results are compared with the results obtained from Monte

    Carlo simulations.

    Formulation of Objective Function

    When end-users connect to an AP to access the Internet, the AP has a total bandwidth of B

    (Mbits/sec) available for all the end-users. Suppose that end-users arrive at the AP according

    to a Poisson process distribution with an arrival rate (users/minute) and each end-user

    utilizes (transmits and receives) a certain amount of data during their connection to theInternet before disconnecting. Literature on data analysis of internet traffic describes the sizes

    of the files transmitted over the Internet as being heavy tail distributed. The transmission

    durations also follows a heavy-tailed distribution due to the heavy-tailed distributed file sizes.

    It is generally assumed that the service time is strongly correlated to the file size. In this

    context, the service time is taken to be equal to the transmission time of a file, which is

    proportional to the size of the file. For simplification, we suppose that file sizes are

    exponentially distributed with meanF (Mbits). When there areN1 users in the system at the

    same time, each user is allocated an instantaneous bandwidth ofB/N. This system is shown in

    the following figure and is equivalent to an M/M/1/S PS (Processor Sharing) queue with

    arrival rate and exponentially distributed service rate (minute). The figure shows that

    the system moves from one state to the other based on arrival rate and service rate .

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    14/42

    9 | P a g e

    Therefore, the traffic intensity is denoted as = / . In practice, it is suggested that a shared

    resource should be designed in such a way that its utilization is less than two-third of its full

    capacity (=1).In an M/M/1/S queue system, when there are S customers in the system or the

    system is saturated, theblocking probabilityPSis:

    (1)

    Since the maximum value of end-users that can be accommodated (S) is determined by the

    blocking probability given a certain traffic intensity , the minimum bandwidth allocation for

    a certainPSisB/S given a certain traffic intensity . Therefore, we can also say a minimum

    bandwidth allocated to the end-users can be determined by a givenPS. From the viewpoint of

    the AP providers, the lower blocking probability (PS) implies that more end-users can obtain

    services and more revenue can be generated. However, according to Eq.1 the lower blocking\

    probability also means that the maximum of end-users (S) in the system is higher. Hence,

    from the end-user point of view, even while their requests can be accommodated with higherprobability due to the lower blocking probability, the minimum bandwidth that can be

    allocated to them might be lower. In this pricing model, we use the blocking probability as an

    indicator of the minimum bandwidth to determine the limitation for the value ofPS, we will

    use the blocking probability to model the end-users reaction to the minimum bandwidth.

    According to queue theory, the average number of customers at the services facilityNSis:

    (2)However, the arriving end-users are price sensitive. Their responses to the price charged by

    the AP depend on a number of factors. A probabilistic model for end-users willingness-to-

    pay the quoted price using a Pareto distribution of customer capacity to pay is used. Everyend-user has the capacity to pay based on a Pareto distribution with scale b and shape ,

    where all customers have capacities at least as large as b and determines how the capacities

    are distributed. Thus and b are the Pareto distribution parameters for the end-user capacity

    to pay function. It is reasonable to assume that end users willingness-to-pay is associated

    with their capacities to pay. Therefore, the expectation of acceptance given price p is:

    (3)Where is the equivalent to the economic elasticity of demand of the end-users. The higher

    the value of , the more willing the end-users is to pay. Thus, the arrival rate of our model

    is different from that of the conventional M/M/1/S queuing system as mentioned above by a

    factor of E: E. In other words, the arrival rate is denoted as a function of the price.

    Correspondingly, the traffic intensity of the system model that we mentioned above is

    denoted as (p)= E(p) / . Figure (a) shows that the traffic intensity decreases when the

    quoted price increases, since a higher price leads to a smaller end-user arrival rate.

    Substituting (p) for in (1) and (2), we get the following:

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    15/42

    10 | P a g e

    (4)&(5)

    Therefore, the long-term average revenue per unit time isexpressed as:

    (6)wherep is the price per Mbit of data transferred.

    Now we can formulate the optimization problem to determine the optimal price:

    (7)where is a constraint of blocking probability S P . The solution of this optimization problem

    is characterized by:

    Therefore, the long-term average revenue per unit time is maximized whenpoptis equal to:

    Analytical Simulation Results

    Figure (a): Traffic intensity versus quoted price

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    16/42

    11 | P a g e

    The objective function in Eq.7 is shown numerically in Figure (b) with =2, b=4, =6,

    =0.01. Figure (b) characterizes the relationships between the revenue, the price and the end-

    usersresponse to the price by adjusting the amount of usage of the Internet service. As the

    price increases, numbers of end-users decreases while the revenue per end-user increases.

    The total revenue is maximized when the price reaches the optimal price popt.

    popt = 3.68

    Figure (b): Average revenue v/s quoted price

    Figure (c)-Figure (e) shows how the parameters of the function of willingness-to-pay affect

    the value of the optimal price. It is shown that the parameters and have little impact on the

    value of the optimal price while parameter b plays an important role in determining the

    optimal price.

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    17/42

    12 | P a g e

    Figure (c): Average revenue v/s quoted price for different a

    Figure (d): Average revenue v/s quoted price for different b

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    18/42

    13 | P a g e

    Figure (e): Average revenue v/s quoted price for different delta

    Monte Carlo Simulation Results

    popt = 3.65

    Figure(f): Comparison of Analytical result and Monte Carlo result

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    19/42

    14 | P a g e

    Conclusion

    In this work, an optimal pricing model for Internet service resale via WMN is presented. We

    model end-users traffic as a function of the service price. Based on a queuing system model,

    an optimal price algorithm is developed to maximize the AP providers revenue. The

    performance of the proposed pricing scheme is investigated and the analytically optimal priceis compared to the results of the session level Monte-Carlo simulations. It is shown that the

    proposed optimal pricing scheme can provide maximized revenue to the AP provider, a better

    quality of service in terms of the minimum bandwidth allocation to the end-users and an

    efficient control of the traffic load at the AP node to avoid congestion. The optimal price

    found in both the analytical method and Monte Carlo method is almost same.

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    20/42

    15 | P a g e

    PART BPROPOSED APPROACH

    Our goal is to find a multicast tree which minimizes the cost function along with having an

    optimal level of delay. This is very important in multimedia applications like videoconferencing and remote collaboration which rely on the ability of the network to give

    multicast communication.

    Goal

    The QoS parameters we have taken into consideration in this project is

    Bandwidth (modelled as cost)

    Delay in the link

    The goal is to:

    Minimize Average path delay

    Minimize total tree cost

    Network model

    Figure (a): Network model

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    21/42

    16 | P a g e

    Minimum cost tree

    We find this using the Prims algorithm.

    Pseudocode

    Minimum-Spanning-Tree-by-Prim(G, weight-function, source)1 for each vertex u in graph G

    2 set key of u to_

    3 set parent of u to nil

    4 set key of source vertex to zero

    5 enqueue to minimum-heap Q all vertices in graph G.

    6 while Q is not empty

    7 extract vertex u from Q// u is the vertex with the lowest key that is in Q

    8 for each adjacent vertex v of u do

    9 if (v is still in Q) and (weight-function(u, v) < key of v)

    then10 set u to be parent of v // in minimum-spanning-tree

    11 update v's key to equal weight-function(u, v)

    Output

    Figure (b): Minimum cost tree

    Shortest Delay Tree

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    22/42

    17 | P a g e

    We find this using Djikstras Algorithm.

    Pseudocode

    1 functionDijkstra(Graph, source):

    2for each

    vertexvin

    Graph:

    //Initializations3 dist[v] := infinity ; // Unknown distance function

    from4 // source to v5 previous[v] := undefined ; // Previous node in optimal

    path6 end for // from source

    7

    8 dist[source] := 0 ; // Distance from source to

    source9 Q:= the set of all nodes in Graph; // All nodes in the graph are10 // unoptimized - thus are in Q11 whileQis notempty: // The main loop

    12 u:= vertex in Qwith smallest distance in dist[] ; // Startnode in first case13 remove ufrom Q;14 ifdist[u] = infinity:15 break; // all remaining vertices are16 end if // inaccessible from source

    1718 for eachneighbor vof u: // where v has not yet been

    19 // removed from Q.20 alt:= dist[u] + dist_between(u, v) ;21 ifalt< dist[v]: // Relax (u,v,a)

    22 dist[v] := alt;23 previous[v] := u;

    24 decrease-key vin Q; // Reorder v in the Queue25 end if

    26 end for27 end while28 returndist;

    Output

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    23/42

    18 | P a g e

    Figure (c): Shortest delay tree

    Our proposed algorithm

    Step 1: Compute minimum cost tree

    Step 2: Set a delay constraint Delta

    Step 3: Remove all the nodes from MCT recursively which do not satisfy Delta

    Step 4: Identify the paths from the network which have minimum delay from source. Step 5: Remove loops if any

    Step 6: Add these paths to the tree

    Operating details

    Input:

    A graph G=(V,E)

    A delay matrix of dimensions nxn where n is the number of nodes

    A cost matrix of dimensions nxn where n is the number of nodes

    Delay constraint Delta=9Output:

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    24/42

    19 | P a g e

    An optimized tree spanning from source to all nodes

    Output

    Figure (d): Our algorithm with delta=9

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    25/42

    20 | P a g e

    Calculations

    Minimum cost tree Shortest delay tree Our tree

    Node Cost Delay Cost Delay Cost Delay

    A 5 9 11 7 5 9

    B 2 7 8 5 2 7

    C 3 2 3 2 3 2

    D 12 16 14 8 14 8

    E 11 8 11 8 11 8

    F

    G 5 7 13 5 5 7

    H 5 4 5 4 5 4

    I 9 11 12 5 12 5

    Sum 52 64 77 44 57 50

    Results

    MCT:

    Cost of tree: 35

    Average cost per path: 6.5

    Average delay per path: 8

    SDT:

    Cost of tree: 48

    Average cost per path: 9.625

    Average delay per path: 5.5

    Our solution:Cost of tree: 42

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    26/42

    21 | P a g e

    Average cost per path: 7.125

    Average delay per path: 6.25

    We are able to provide an algorithm which provides an intermediate value of delay and cost.

    This is very important because for applications like videoconferencing and remote

    collaboration there is a need to have delay within specific constraints. Otherwise theapplication is rendered useless. As future work we wish to focus on including other QoS

    parameters such as jitter into the framework. This will make the algorithm more

    comprehensive.

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    27/42

    22 | P a g e

    APPENDIX I

    MATLAB CODES

    clear all

    lambda=3/60;mu=1/19;

    a=2;

    b=4;

    delta=6;

    p=[0:.001:20];

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    28/42

    23 | P a g e

    end

    j=1;

    s=15;

    F=10;

    forp=0:.001:20

    AvgR(j)=(rho(j).*(1-(((1-rho(j)).*(rho(j).^s)))./((1-(rho(j).^(s+1)))))).*(p)*10;

    X(j)=(((1-rho(j)).*(rho(j).^s)))./((1-(rho(j).^(s+1))));

    j=j+1;

    end

    p=[0:.001:20];

    plot(p,AvgR);

    grid on

    xlabel('quoted price');ylabel('average revenue');

    title('figure-b:AVERAGE REVENUE V/S QUOTED PRICE');

    clear all

    lambda=3/60;

    mu=1/19;

    a=2;

    b=4;

    delta=6;

    p=[0:.001:20];

    %for p=0:.1:20

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    29/42

    24 | P a g e

    else

    rho1(i)=(lambda/mu).*((delta/(a+delta)).*((b./p).^delta));

    i=i+1;

    end

    enda=6;

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    30/42

    25 | P a g e

    j=j+1;

    end

    p=[0:.001:20];

    plot(p,AvgR,p,AvgR1,p,AvgR2);

    xlabel('quotted price')

    ylabel('average revenue')

    title('figure(c): AVERAGE REVENUE V/S QUOTED PRICE FOR DIFFERENT VALUES

    OF a');

    grid on

    legend('blue:a=2,green:a=4,red:a=6');

    clear all

    lambda=3/60;

    mu=1/19;

    a=2;

    b=4;

    delta=6;

    p=[0:.001:20];

    %for p=0:.1:20

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    31/42

    26 | P a g e

    b=12;

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    32/42

    27 | P a g e

    plot(p,AvgR,p,AvgR1,p,AvgR2);

    xlabel('quotted price')

    ylabel('average revenue')

    title('figure(d): AVERAGE REVENUE V/S QUOTED PRICE FOR DIFFERENT VALUES

    OF b');

    grid onlegend('blue:b=4,green:b=8,red:b=12');

    clear all

    lambda=3/60;

    mu=1/19;

    a=2;

    b=4;

    delta=6;p=[0:.001:20];

    %for p=0:.1:20

    i=1;

    forp=0:.001:20

    ifp

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    33/42

    28 | P a g e

    i=i+1;

    else

    rho2(i)=(lambda/mu).*((delta/(a+delta)).*((b./p).^delta));

    i=i+1;

    end

    end

    j=1;

    s=15;

    F=10;

    forp=0:.001:20

    AvgR(j)=(rho(j).*(1-(((1-rho(j)).*(rho(j).^s)))./((1-(rho(j).^(s+1)))))).*(p)*10;

    j=j+1;

    end

    j=1;

    s=15;

    F=10;

    forp=0:.001:20

    AvgR1(j)=(rho1(j).*(1-(((1-rho1(j)).*(rho1(j).^s)))./((1-(rho1(j).^(s+1)))))).*(p)*10;

    j=j+1;

    end

    j=1;

    s=15;

    F=10;

    forp=0:.001:20

    AvgR2(j)=(rho2(j).*(1-(((1-rho2(j)).*(rho2(j).^s)))./((1-(rho2(j).^(s+1)))))).*(p)*10;

    j=j+1;

    end

    p=[0:.001:20];

    plot(p,AvgR,p,AvgR1,p,AvgR2);

    xlabel('quotted price')

    ylabel('average revenue')

    title('figure(e): AVERAGE REVENUE V/S QUOTED PRICE FOR DIFFERENT VALUESOF delta');

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    34/42

    29 | P a g e

    grid on

    legend('blue:delta=6,green:delta=8,red:delta=10');

    clear all

    lambda=3/60;mu=1/19;

    a=2;

    b=4;

    delta=6;

    N=1000;

    p=20*rand(N,1);

    j=1;k=1;

    fori=1:1000

    ifp(i)

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    35/42

    30 | P a g e

    end

    j=1;

    s=15;

    F=10;forp=0:.001:20

    AvgR(j)=(rho(j).*(1-(((1-rho(j)).*(rho(j).^s)))./((1-(rho(j).^(s+1)))))).*(p)*10;

    X(j)=(((1-rho(j)).*(rho(j).^s)))./((1-(rho(j).^(s+1))));

    j=j+1;

    end

    p=[0:.001:20];

    plot(p,AvgR,'r');

    grid onxlabel('quoted price');

    ylabel('average revenue');

    title('figure-b:AVERAGE REVENUE V/S QUOTED PRICE for both');

    legend('red:analytical,blue:monte carlo');

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    36/42

    31 | P a g e

    APPENDIX II

    C++ code#include

    #include

    int cost[9][9]={{0, 3, 9999, 9999, 12, 9999, 9999, 9999, 9999},

    {3, 0, 5, 9999, 9999, 2, 9999, 9999, 7},

    {9999, 5, 0, 9999, 9999, 3, 9999, 2, 9999},

    {9999,9999, 9999, 0, 11, 9999, 7, 9, 9999},

    {12, 9999, 9999, 11, 0, 9999, 9999, 6, 9999},

    {9999, 2, 3, 9999, 9999, 0, 5, 9999, 12},

    {9999,9999, 9999, 7, 9999, 5, 0, 8, 9999},

    {9999,9999, 2, 9, 6, 9999, 8, 0, 9999},

    {9999, 7, 9999, 9999, 9999, 12, 9999, 9999, 0}};

    int delay[9][9]={{ 0, 2,9999,9999, 5,9999,9999,9999,9999},

    { 2, 0, 3,9999,9999, 7,9999,9999, 4},

    {9999, 3, 0,9999,9999, 2,9999, 2,9999},

    {9999,9999,9999, 0, 4,9999, 9, 4,9999},

    { 5,9999,9999, 4, 0,9999,9999, 4,9999},

    {9999, 7, 2,9999,9999, 0, 7,9999, 5},

    {9999,9999,9999, 9,9999, 7, 0, 1,9999},

    {9999,9999, 2, 4, 4,9999, 1, 0,9999},

    {9999, 4,9999,9999,9999, 5,9999,9999, 0}};

    int t[10][2];//holds the minimum spanning treeint f[10][2];//holds the final tree

    int k=0,d[10],p[10];

    void prims(int n,int source)

    {

    int i,j,u,v,min;

    int sum; //holds the cost of the minimum spanning tree

    int k; //index for storing the edges w.r.t minimum spanning tree

    int p[10]; //holds the vertices selected

    int d[10]; //holds the weights for the selected edges

    int s[10]; //has the information of nodes visited and nodes not visited

    //int source; //contains the vertex from where least edge starts

    min=9999;

    //source=5;

    /*for (i=0;i

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    37/42

    32 | P a g e

    min=cost[i][j];

    source=i;

    }

    }

    }*/

    //initialization

    for (i=0;i

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    38/42

    33 | P a g e

    if (s[v]==0 && cost[u][v]=9999)

    printf("Spanning tree does not exist\n");

    else

    {

    printf("Minimum cost tree\n");

    for (i=0;i

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    39/42

    34 | P a g e

    void dijkstra(int n, int source, int dest)

    {

    int i,j,u,v,min;

    int s[10];

    for (i=0;i

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    40/42

    35 | P a g e

    }

    }

    }

    void add_path(int source, int destination)

    {int i;

    i=destination;

    while(i!=source)

    {

    printf("%d

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    41/42

    36 | P a g e

    for (int i=0;i

  • 8/12/2019 Major Project Report 7th Sem09EEG17

    42/42

    REFERENCES

    1.

    J. Musacchio and J. Walrand, WiFi access point pricing as a dynamic game inIEEE/ACM Trans. Networking,Vol. 14(2), pp. 289-301, Apr. 2006.

    2. K. Chen, Z. Yang, C. Wagener, and K. Nahrstedt, Market model and pricingmechanisms in a multihop wireless hotspot network in Proceeding of ACM

    MobiQuitous Conference, July 2005.

    3. M.L. Mokbel, W.A. El-Haweet and M.L. El-Derini, A Delay-Constrained Shortest Path

    Algorithm f or M ulti cast Routing in M ultimedia Appli cations

    4. R. Bellman, Dynamic Programming. Princeton University Press, 1957.

    5. G. Feng, and T.S.P. Yum, Efficient multicast routing with delay constraints

    International Journal of Communication Systems, 1999