About this Journal Submit a Manuscript Table of Contents
Journal of Applied Mathematics
Volume 2013 (2013), Article ID 480962, 9 pages
http://dx.doi.org/10.1155/2013/480962
Research Article

A Game-Theoretic Analysis of Bandwidth Allocation under a User-Grouping Constraint

1Department of Electrical Engineering, National Chung Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan
2Department of Law and Graduate Institute of Technology Management, National Chung Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan

Received 2 October 2012; Revised 22 December 2012; Accepted 26 December 2012

Academic Editor: Xiaoning Zhang

Copyright © 2013 Shun-Pin Hsu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A new bandwidth allocation model is studied in this paper. In this model, a system, such as a communication network, is composed of a finite number of users, and they compete for limited bandwidth resources. Each user adopts the decision that maximizes his or her own benefit characterized by the utility function. The decision space of each user is subject to constraints. In addition, some users form a group, and their joint decision space is also subject to constraints. Under the assumption that each user’s utility function satisfies some continuity and concavity conditions, the existence, uniqueness, and fairness, in some appropriate sense, of the Nash equilibrium point in the allocation game are proved. An algorithm yielding a sequence converging to the equilibrium point is proposed. Finally, a numerical example with detailed analysis is provided to illustrate the effectiveness of our work.

1. Introduction

With the widespread use of internet and the increasing popularity of mobile devices, more and more people can get online at almost anytime and anywhere. An immediate challenge facing the significant increment of online users is the support of quality of service (QoS). Over the past decade considerable efforts have been made to ensure the smooth operation of the networking systems. For example, the load balancing problems were considered by Anselmi et al. [1] and Ayesta et al. [2]. The routing problems were studied by La and Anantharam [3], Richman and Shimkin [4], Boulogne et al. [5], and Korilis et al. [68]. Niyato and Hossain [9] studied the practical issue such as the admission control for the wireless broadband standard. Ganesh et al. [10] and Yaïche et al. [11] considered the pricing issues. In modeling the networking problems, quite often the bandwidth availability is the main concern and has its role in the associated performance measure. The network system quantifies the results caused by different operation scenarios and seeks the approach leading to the greatest benefits in some sense. Since the benefit of any network user inevitably involves that of other users, its evaluation is mostly carried out in the context of game theory. In the survey paper Altman et al. collected a long list of networking models based on game theoretic formulation. Interested readers are referred to [12] and the rich reference therein.

As mentioned above, the bandwidth availability is the major concern in many networking problems. The bandwidth allocation is thus the core issue as far as the quality of service is concerned. While the bandwidth allocation problem was considered by many authors in different contexts of networking protocols or communication standards (see e.g., [9, 11, 13, 14]), at a high level of abstraction the problem can be regarded as the classical resources distribution problem studied in many professional fields such as economics, management science, and operations research. Given a finite number of units competing for the limited resources, how does each unit decide its share based on its own utility function? Lazar et al. [15] formulated this problem for the network composed of noncooperative users. Under certain monotonicity, differentiability, and convexity assumptions on the cost function the unique existence and certain fairness property of the Nash equilibrium point (NEP) were proved. An algorithm based on Gauss-Seidel and Jacobi schemes was proposed and proved to yield a sequence converging to the NEP. However, the framework in [15] assumes only the natural constraint for the bandwidth allocation. That is, the feasible bandwidth of any user falls within the interval lower bounded by zero and upper bounded by the bandwidth available for that user. In practice some techniques such as the bandwidth throttling and bandwidth/traffic shaping [16] are available to provide more adaptive bandwidth control. To address this issue, Rhee and Konstantopoulos [17, 18] relaxed the assumption and allowed some prespecified numbers for the upper and lower bounds of the bandwidth. This relaxation increases the flexibility of flow control and helps the QoS satisfaction by the networking system. On the other hand, in modern broadband communication systems some users might form a group and expect the group-wise QoS, in addition to the user-wise one. For example, the customers of an internet service provider (ISP) might include the individuals and a company with many employees. To maintain the QoS, parameters would be assigned to bound the bandwidth of each individual and each employee. Furthermore the ISP and the company would set the constraint for the employee-averaged, or equivalently, employee-totaled bandwidth, as shown in Figure 1. A similar concept of group constraint can be seen in the cost-effective broadband access network such as the Ethernet-based passive optical network (EPON) [19, 20]. This system is composed of an optical line terminal (OLT) and many optical network units (ONUs). The OLT is situated in the central office and ONUs are distributed over the remote areas for multimedia communication with the subscribers. In the upload process each ONU adopts the time division multiplexing access (TDMA) protocol to transmit data frames to the OLT, in the sense that each ONU only transmits the data during the time slots specifically scheduled for it [21]. The protocol avoids the frame collisions between different ONUs at the cost of imposing the upper bound for the time-average flow of each ONU and the upper bound for the total flow of all ONUs.

480962.fig.001
Figure 1: The system bandwidth allocation subject to user-wise constraints: for , and a user-grouping constraint . The total allocation is less than , the total bandwidth.

In light of the bandwidth sharing mechanism in EPON and other similar systems, we extend the existing results to include the user-grouping constraint for better model fitting. Suppose each user has his or her own utility function that describes the relation between the allocated bandwidth and the resultant benefit to that user. Following the standard assumptions, (1) the function depends on the bandwidth of the user, and on the bandwidth of other users only through their total bandwidth, and (2) the function satisfies certain continuity and concavity properties; we show the unique existence and the fairness with some appropriate sense, of the NEP in the allocation game. The contributions of our work are twofold. First, a novel concept called user-grouping NEP is proposed. This concept is corresponding to the new introduction of the group constraint, under which the uniqueness of NEP proved in [15, 17] no longer holds. Based on this concept we give a new definition for the equilibrium point and prove its uniqueness under our assumptions. The fairness of the allocation based on the user-grouping NEP is also proved. Second, we show that the Gauss-Seidel type algorithm in [15, 18] can be modified to yield a sequence converging to the user-grouping NEP. Since the bandwidth allocation is of central concern in networking systems, our results might result in the reinvestigation and reformulation of other networking issues such that more practical approaches can be developed.

2. Preliminaries

Suppose a networking system has users and they compete for the system bandwidth. Each user is assigned with the bandwidth subject to predecided upper and lower bounds. In addition, of the users form a group and the total bandwidth of the users is also subject to a predecided constraint. We would like to design the system bandwidth allocation policy that optimizes the performance index of each user in the game-theoretical sense. For convenience, we use the list of nomenclature shown at the end of the paper.

Assume the utility function for each user depends on the bandwidth of that user and the total bandwidth of other users. That is, the utility function for user in can be written as . Also, assume the utility function satisfies the following continuity and concavity properties [18]:

Assumption 1. For each utility function (a) is continuously differentiable with respect to ; (b) is strictly decreasing with respect to and nonincreasing with respect to .

Now we define the allocation function. For user in with the available bandwidth , the allocation function is defined as For user in with the available bandwidth and inside-group information , the allocation function is defined as

Assumption 2. The bandwidth allocation with the constraint parameters has the following properties: (a) for each feasible and where , and for each feasible where ; (b).

In our framework, the classical Nash equilibrium point (NEP) in the allocation game is defined as where Note that is if and is otherwise. The user-grouping NEP is defined as where

Remark 3. The definitions (3)-(4) reflect the central concept of the well-studied constrained NEP. That is, given the constrained strategy space for each user , is defined as the maximizer of the utility function of user provided that the strategy is adopted by user for each . Note that the bandwidth of users in the group should satisfy the extra group constraint and thus might lose its uniqueness in as the group constraint is active. The novel concept of user-grouping NEP in (5)-(6) is thus proposed to compensate the property of the equilibrium point. We will show in Section 3.1 that our setting ensures the uniqueness of the user-grouping NEP.

Remark 4. Suppose . Also, let , then By part (a) in Assumption 2 we have Consequently, This means that the NEP, or , satisfies the natural constraint and the constraint is always inactive. Part (b) in Assumption 2 is a natural condition such that the constraint makes sense.

The existence of the NEP in our setting is guaranteed by Rosen’s result in the following.

Theorem 5 (see [22, Theorem 1]). An equilibrium point exists for every concave -person game.

Theorem 5 can be obtained using the classical Kakutani fixed point theorem and in some sense generalizes Nash’s setting on the strategy space of the users [23, 24]. In the next section we delve into other properties and propose an algorithm to locate the NEP.

3. Main Results

3.1. Uniqueness

Our first result is concerned with the uniqueness of the user-grouping NEP. This property as shown in [18, page 13] is not implied by the uniqueness theorem in [22]. For the NEP defined in (3)-(4), the Karash-Kuhn-Tucker (KKT) conditions must be satisfied. That is, for each there exist KKT multipliers and (see e.g., [25, page 458]) such that In addition, for each there exist KKT multipliers and satisfying (11)–(14), and and satisfying where is defined in (6).

Lemma 6. For each , let and for some feasible and , then where the nonnegative KKT multipliers , ,   and satisfy

Proof. Since and are both feasible, implies and by (21) and (22), respectively. Consequently, the result follows since and .

Theorem 7. The user-grouping NEP defined in (5) is unique.

Proof. Suppose and are both the equilibrium points. Let and . We can thus write for that where , ,  , are the associated KKT multipliers. Assume that . If there exists such that , by Lemma 6 and Assumption 1 we have which is a contradiction. We thus have for in . This implies . Note that, for , With similar arguments in proving Lemma 6 we can show that If for some , we have which is a contradiction. We thus have for each and therefore , also a contradiction. With analogous arguments we can show that assuming also leads to a contradiction. Therefore and by Lemma 6   for . This implies ; therefore is unique.

3.2. Fairness

A bandwidth allocation is said to be fair if for any feasible and where , and for any feasible where . This definition suggests that a fair allocation guarantees the user in greater need of bandwidth actually obtains more bandwidth.

Theorem 8. The bandwidth allocation based on the NEP defined in (3)-(4) is fair.

Proof. Suppose . Let and . We thus have Assume , which implies and by Lemma 6  . Also, Similarly, Note that (32) implies . We then have which is a contradiction. Therefore, , which implies namely, To show the allocation based on is fair, consider first the case that . By definition , where , , and are all feasible. With defined in (9) we have which equals the remaining bandwidth of the system after allocation. Given , we have Note that Equations (35) and (37) imply ; hence . The case for can be similarly proved and is thus ignored (see [18, Theorem 2.3] for details).

3.3. Algorithm

In this section we analyze the scheme to identify the user-grouping Nash equilibrium point. We say an individual update is implemented on user if the bandwidth of each user other than is fixed and the bandwidth of user is updated to maximize his or her utility function. In addition, we say a batch update occurs in the collection of users if the bandwidth of each user not in is fixed and the individual update is sequentially implemented on each user in repeatedly till an equilibrium is reached. Here is either or . If the batch update is implemented assuming no group constraint, namely, and . Note that the batch update is guaranteed to reach an equilibrium (see [15] and [18, Section 2.4]). As a result, suppose is the system allocation at step . If an individual update occurs at user at step , that means for , and for some KKT multipliers and and . If a batch update occurs at the group of users at step , that means for each , and we can write for each where , , and are the associated KKT multipliers. We now show that a repeated implementation of sequential batch updates on users in and users in , as outline in Algorithm 1, yields a sequence converging to the user-grouping NEP in (5). Define first the error measure between and as where . and are defined in (6) and (9), respectively.

alg1
Algorithm 1: The scheme to locate the user-grouping NEP.

Lemma 9. The error measure defined in (41) is nonincreasing, namely, for any positive integer .

Proof. If at step an individual update occurs at , (39) is satisfied. Since (10) is also satisfied, we have by Lemma 6 and part (b) in Assumption 1 that Under the assumption Suppose . If , then Since implies , we have Using similar arguments we can analyze the case for and obtain also that . If at step a batch update occurs, (15) and (40) hold for each . Suppose . If there exists an such that then part (b) in Assumption 1 implies therefore by (26) . If no such exists, namely, for each , then naturally . A similar result can be derived for the case . We then have Now Assume . If then If , which is equivalent to , then Applying similar arguments again we can analyze the case for and obtain also that .

Theorem 10. Algorithm 1 yields a sequence converging to , the user-grouping NEP of the bandwidth allocation game.

Proof. In the light of Lemma 9, we only need to show that for each positive integer , implies the existence of a finite integer such that . Suppose it is not the case Then there exists some such that for any positive integer , where . Consider the update scheme that, at step for , the individual update occurs at user , and at step the batch update takes place for users in . Without loss of generality we assume , then by (47). Since , (50) together with (51) implies ; hence . That is, and do not change their signs as the step number is increased from to . Moreover, implies . Since for , (44) and (45) together imply and thus , for . As a result, for . Note that and We conclude that and for , namely, , a contradiction.

4. A Numerical Example

Consider a data communication network system with 100 users. Suppose 30 of them form a group. We then have and . The adopted utility function is where the parameters ’s are listed in Table 1. Note that the utility function, known as the generalized power function [26], has the continuity and concavity properties required by Assumption 1. In particular, it can be shown [18, page 11] easily that the maximizer and thus part (a) in Assumption 2 is satisfied. Suppose the total available bandwidth , and the upper and lower bounds for total bandwidth allocated to the group is and , respectively. Assume that the individual bandwidth constraint for each user in Table 2 is used. Clearly these parameters satisfy the natural requirements of part (b) in Assumption 2. Applying Algorithm 1 yields a dynamic bandwidth allocation evolving with the implementation step, as shown in Figure 2. The left part of the figure shows the evolution of total bandwidth allocated to the group, which is composed of user 1, user 2, up to user 30. At the beginning of the algorithm, an initial feasible bandwidth allocation is allocated to each user of the system. Fix the total bandwidth allocated to the users not in the group and find the optimal total bandwidth . In the example is 3950.3. Since this value is greater than the upper bound . is replaced with . Fix this we have the total available bandwidth for users not in the group. Based on this availability of the bandwidth we can find the equilibrium point for users not in the group. In the example we have, for instance, the bandwidth , , and . Now fix the total bandwidth of the users not in the group, and find the optimal bandwidth again. In the example we obtain . Since this value is greater than the upper bound , is replaced with again. Note that the current optimal bandwidth allocation for each user outside the group is found based on the condition that the total bandwidth for the group is . The current and is thus the and for the user-grouping NEP in (5).

tab1
Table 1: The parameters of for .
tab2
Table 2: The bandwidth constraint for each user.
fig2
Figure 2: The sequence generated by Algorithm 1 for the example.

5. Conclusion

We have proposed a novel bandwidth allocation model based on game theory. The consideration of the user-grouping constraint distinguishes this model from the abundant ones concerning similar allocation issues. Suppose each user competes for the system bandwidth resources and is granted with a constrained decision space. In particular, some users are united in one group and the total bandwidth allocated to the group is constrained as well. Given the appropriate constraint parameters and the utility function satisfying mild continuity and concavity conditions for each user, we have shown the unique existence of the user-grouping Nash equilibrium point for the allocation game. In addition, we have shown the fairness, in a proper sense, of the allocation based on this equilibrium point. Finally, we have proposed an iterative algorithm and proved that a sequence converging to the point can be generated by the algorithm. A practical example illustrating a network satisfying our settings has been given to show how the equilibrium point can be located successfully.

Nomenclature

:The index set for the users, that is,
:The index set for the users in the group, that is,
:The index set for the users not in the group, that is,
:The bandwidth allocated to user
:Lower bound for
:Upper bound for
:Total bandwidth allocated to the group members, that is,
:Lower bound for
:Upper bound for
:Total bandwidth available in the system
:Total bandwidth allocated, that is,
:Total bandwidth allocated, excluding to user , that is,
:Total bandwidth available for user , that is,
:Inside-group information for user , that is, .

Acknowledgment

This research was supported by the National Science Council of Taiwan under Grant NSC 100-2221-E-005-071.

References

  1. J. Anselmi, U. Ayesta, and A. Wierman, “Competition yields efficiency in load balancing games,” Evaluation, vol. 68, no. 11, pp. 986–1001, 2011. View at Publisher · View at Google Scholar
  2. U. Ayesta, O. Brun, and B. J. Prabhu, “Price of anarchy in non-cooperative load balancing games,” Performance Evaluation, vol. 68, no. 12, pp. 1312–1332, 2011. View at Publisher · View at Google Scholar
  3. R. J. La and V. Anantharam, “Optimal routing control: repeated game approach,” IEEE Transactions on Automatic Control, vol. 47, no. 3, pp. 437–450, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. O. Richman and N. Shimkin, “Topological uniqueness of the nash equilibrium for selfish routing with atomic users,” Mathematics of Operations Research, vol. 32, no. 1, pp. 215–232, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. T. Boulogne, E. Altman, H. Kameda, and O. Pourtallier, “Mixed equilibrium (ME) for multiclass routing games,” IEEE Transactions on Automatic Control, vol. 47, no. 6, pp. 903–916, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  6. Y. A. Korilis, A. A. Lazar, and A. Orda, “Architecting noncooperative networks,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 7, pp. 1241–1251, 1995. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. A. Korilis, A. A. Lazar, and A. Orda, “Achieving network optima using Stackelberg routing strategies,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 161–173, 1997. View at Scopus
  8. Y. A. Korilis, A. A. Lazar, and A. Orda, “Capacity allocation under noncooperative routing,” IEEE Transactions on Automatic Control, vol. 42, no. 3, pp. 309–325, 1997. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  9. D. Niyato and E. Hossain, “QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: a non-cooperative game theoretic approach,” Computer Networks, vol. 51, no. 11, pp. 3305–3321, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Ganesh, K. Laevens, and R. Steinberg, “Congestion pricing and noncooperative games in communication networks,” Operations Research, vol. 55, no. 3, pp. 430–438, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  11. H. Yaïche, R. R. Mazumdar, and C. Rosenberg, “A game theoretic framework for bandwidth allocation and pricing in broadband networks,” IEEE/ACM Transactions on Networking, vol. 8, no. 5, pp. 667–678, 2000. View at Scopus
  12. E. Altman, T. Boulogne, R. El-Azouzi, T. Jiménez, and L. Wynter, “A survey on networking games in telecommunications,” Computers & Operations Research, vol. 33, no. 2, pp. 286–311, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. F. Bonomi and K. W. Fendick, “Rate -based flow control framework for the available bit rate ATM service,” IEEE Network, vol. 9, no. 2, pp. 25–39, 1995. View at Publisher · View at Google Scholar · View at Scopus
  14. D. Niyato and E. Hossain, “Queue-aware uplink bandwidth allocation and rate control for polling service in IEEE 802.16 broadband wireless networks,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 668–679, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. A. A. Lazar, A. Orda, and D. E. Pendarakis, “Virtual path bandwidth allocation in multiuser networks,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 861–871, 1997. View at Publisher · View at Google Scholar
  16. J. W. Evans and C. Filsfils, Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice, Morgan Kaufmann, Boston, Mass, USA, 1st edition, 2007.
  17. S. H. Rhee and T. Konstantopoulos, “Decentralized optimal flow control with constrained source rates,” IEEE Communications Letters, vol. 3, no. 6, pp. 188–190, 1999. View at Publisher · View at Google Scholar
  18. S. H. Rhee, Optimal flow control and bandwidth allocation in multiservice networks: decentralized approaches [Ph.D. thesis], The University of Texas at Austin, 1999.
  19. C. M. Assi, Y. Ye, S. Dixit, and M. A. Ali, “Dynamic bandwidth allocation for quality-of-service over ethernet PONs,” IEEE Journal on Selected Areas in Communications, vol. 21, no. 9, pp. 1467–1477, 2003. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Xie, S. Jiang, and Y. Jiang, “A dynamic bandwidth allocation scheme for differentiated services in EPONs,” IEEE Communications Magazine, vol. 42, no. 8, pp. 32–39, 2004. View at Publisher · View at Google Scholar
  21. S. I. Choi and J. D. Huh, “Dynamic bandwidth allocation algorithm for multimedia services over ethernet PONs,” ETRI Journal, vol. 24, no. 6, pp. 465–468, 2002. View at Scopus
  22. J. B. Rosen, “Existence and uniqueness of equilibrium points for concave n-person games,” Econometrica, vol. 33, pp. 520–534, 1965. View at MathSciNet
  23. J. F. Nash, “Equilibrium points in n-person games,” Proceedings of the National Academy of Sciences of the United States of America, vol. 36, pp. 48–49, 1950. View at Publisher · View at Google Scholar · View at MathSciNet
  24. J. Nash, “Non-cooperative games,” Annals of Mathematics, Second Series, vol. 54, pp. 286–295, 1951. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  25. E. K. P. Chong and S. H. Zak, An Introduction to Optimization, Wiley-Interscience, Hoboken, NJ, USA, 3rd edition, 2008.
  26. A. Bovopoulos and A. Lazar, “Decentralized algorithms for optimal flow control,” in Proceedings of the 25th Allerton Conference on Communication, Control, and Computing, pp. 979–988, 1987.