Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

Embed Size (px)

Citation preview

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    1/14

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    2/14

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    3/14

    lower than the network size K, and in realistic scenarios,the network size is much less than the number of availablechannels in the wireless technology utilized for the shortrange transmissions. For instance, Bluetooth uses frequencyhopping for multiple access with a carrier spacing of 1 MHzand a total bandwidth of 80 MHz [31].

    Let Tnk;lj denote the time slot duration allocated bynode k to layer l in the jth frame if flow Fn is used. We needto guarantee that

    Pk2Pni

    PLl1 T

    nk;lj T 8 path i 8 frame j

    where k 0 refers to the BS transmission and k > 0 refers to

    MS Mks transmission. The time proportion tnk;lj Tnk;lj=Trepresents the normalized resource allocation, thus, theresource allocation bound reduces to

    1

    T

    Xk2Pni

    XLl1

    Tnk;lj Xk2Pni

    XLl1

    tnk;lj 1 8i; j 1

    In general, different links may be employing differenttechnologies, and thus having different bandwidths. Thesignal bandwidth for the transmission of node k isdenoted Bk Hz. The wireless channels are assumed to beflat fading. Then, the instantaneous signal to noise ratios

    are used to characterize the channel state information(CSI) under the assumption that the SNR is perfectlyestimated by all MSs and reliably fed back to the BSwithout delay. The SNR vector j

    4fk;k0 jg

    K Kk0;k01

    represents a fading state of the network for frame j wherek;k0 j is the instantaneous SNR on the link between nodesMk and Mk0 . Moreover, is modeled as an ergodic andstationary block-fading process invariant within the dura-tion of the time frame and uncorrelated among consecu-tive frames.

    We consider a network with no loss tolerance, that is,multicast is limited by the supported rate on the link withthe lowest SNR [9]. For this purpose, we define the effective

    SNR for the transmission of node k as follows:

    kj mink02Mnk

    k;k0 j 2

    Assuming capacity-achieving codes are used to provide thecapability of operating at the Shannon capacity, the transmis-sion rate of node k is Rkj Bk log1 kj. The serviceprocess Ck;lj (bits/frame) of node k for the lth video layerand jth frame can be expressed as follows:

    Cnk;lj Tnk;ljRkj BkT t

    nk;lj log21 kj 3

    In the sequel, we drop the frame index j for convenience.

    3 STATISTICAL END-TO-END DELAY BOUNDS FORGENERAL NETWORK FLOWS

    In this section, we describe the procedure for providing end-

    to-end delay guarantees by characterizing link-level QoS

    metrics according to the effective capacity link layer model.

    3.1 Queuing Network Model for Multihop LayeredVideo Transmission

    A separate queue is maintained for each video layer at each

    node. The arrival process at the BS is denoted fA0;lgLl1 and

    is determined by the scalable codec parameters and the

    video content. Given this arrival process and the instanta-

    neous SNRs fk;k0 gK Kk0;k01, we are interested in adaptively

    configuring the service processes fCk;lgL Kl1;k0 such that the

    following condition is satisfied:

    PrXk2Pni

    Dnk;l > Dth

    8 Qthg :

    elQth ; 0 k K; 0 l L; 5

    where Qk;l is the queuing delay at MS Mk for video layer land Qth is the queue-length threshold. The parameter l,termed the QoS exponent, is used to characterize delay.More stringent QoS requirements are characterized bylarger l while looser QoS requirements require smaller l.

    3.2 Effective Bandwidth/Capacity Model

    The effective capacity channel model captures a generalizedlink-level capacity notion of the fading channel bycharacterizing wireless channels in terms of functions thatcan be easily mapped to link-level QoS metrics, such asdelay-bound violation probability. Thus, it is a convenienttool for designing QoS provisioning mechanisms [6], [9].

    We denote by Cnk;ll and Ank;ll the effective capacity

    and effective bandwidth functions, respectively, for thekth link and lth layer when flow Fn is used. Given anarrival process fAnk;lg, its effective bandwidth, denotedby Ank;ll (bits/frame), is defined as the minimum constantservice rate required to guarantee a specified QoS exponent

    l. In contrast, for a given service process fCn

    k;lg, its effectivecapacity, denoted by Cnk;ll (bits/frame), is defined as themaximum constant arrival rate which can be supported byfCnk;lg subject to the specified QoS exponent l. Moreover,for a stationary and ergodic service process fCnk;lg that isuncorrelated across time frames, the effective capacity canbe expressed as follows [33]:

    Cnk;ll 1

    llog

    IE

    elCnk;l

    6

    1

    llog

    IE

    elBk Tt

    nk;l

    log1k

    7

    The target QoS exponent l for a given layer l should be thesame for all transmissions to guarantee the same level ofquality over the entire path. To provide the QoS guaranteel for the lth video layer, the effective capacity on thekth link should be equal to the effective bandwidth [34], i.e.,

    Cnk;ll Ank;ll 8l 1; . . . ; L; k 0; . . . ; K: 8

    Moreover, we assume that, at the link layer, the serviceprocess of the kth queue is input instantaneously as thearrival processes to all its multicast nodes k0 2 Mnk ,i.e., fAnk;lg fC

    nk0;lg 8k

    0 2 Mnk . Thus, Ank;ll C

    nk0;ll 8l; k

    0; . . . ; K; k0 2 Mn

    k

    and each end-to-end path of the networkflow can be treated separately. By induction, we deduce thatthe service processes should be designed to guarantee thatthe effective capacity is the same for the multicast/unicasttransmissions by each node in the network, i.e.,

    Cn0;ll Cnk;ll 8k 1; . . . ; K: 9

    Since all links satisfy the same QoS requirement l and using(7), it is sufficient to ensure that the service processes on alllinks are equal. We deduce that the following condition onthe resource allocation tnk;l will implicitly satisfy (9)

    B0tn0;l log1 0 Bktnk;l log1 k 8k 1; . . . ; K: 10Intuitively, (10) can be described as an adaptive allocationstrategy that guarantees that the video frame data (inbits/frame) are delivered reliably over all multihop paths.

    Since individual links support different rates according tothe instantaneous fading state, the required time slotallocations are weighted inversely by the supported rates.

    3.3 End-to-End Delay Bounds on Network Paths

    The arrival process fA0;lgLl1 at the BS has an average arrival

    rate l IEA0;l=T for each video layer l. The per-layerarrival rate is determined by the parameters of the scalable

    codec andby thevideocontent.Giventhis arrival process andthe instantaneous SNRs, we are interested in adaptivelyconfiguring the service processes fCnk;lg

    L Kl1;k0 such that the

    end-to-end delay bounds are satisfied for every path. Tomodel the end-to-end delay bound for each path in thenetwork, we consider a fluid model of traffic such that theservice at each node is cutthrough. Considering constant ratefluid traffic, the total delay can be bounded as follows [7], [8]:

    PrXk2Pni

    Dnk;l > Dth

    8: 32

    where ~ni is obtained by solving the univariate function

    niXLl1

    tn0;l

    ; l ; ~ni

    1: 33

    Since (31) is strictly decreasing in ni , then if at ni 0, (24)

    is not violated, this constraint will not be active for any niand ni 0 to satisfy (29). Otherwise, if at

    ni 0, (24) is

    violated, we could keep increasing ni until (24) is satisfiedfor some ni

    ~ni with equality so that (29) holds.Finally, since the Lagrangian function Ltnk;l;

    nl ;

    ni ;

    n; ni is concave, we use the subgradient method [9] totrack the optimal and maximize the Lagrangian asfollows:

    nl nl

    IEelB0T t

    n0;l log210

    elCl

    ; 34

    where > 0 is a small positive constant. The estimationfor the expectation IEelB0T t

    n0;l

    log210 is obtained itera-tively for the jth time frame through a first-order low-pass filter as follows:

    Sj 1 1 Sj elB0T tn0;l

    j1 log210j1; 35

    where > 0 is a small positive constant. If the solutionexists, that is, the wireless resources are enough to satisfythe delay constraint, then the convergence of (34) to theoptimal is guaranteed due the concavity of Ltnk;l;

    nl ;

    ni ;

    n

    ; ni over where the solution satisfies (30). Other-

    wise, (34) will not converge indicating that the delayconstraint cannot be satisfied, resulting in an infeasibleproblem. Plugging nl and

    ni into (31), we obtain the

    optimal first hop allocation tn0;l for any flow Fn. The optimalallocation by all nodes can then be computed as follows:

    tnk;l B0 log21 0

    Bk log21 k tn0;l

    ; nl ; ni

    : 36

    After the first few video frames, the process of tracking theoptimal Lagrange multipliers using (34) and (35) converges

    and the network reaches the steady state. In this state, theresource allocation for frame j and flow Fn can be obtainedusing the following steps:

    1. For the instantaneous fading state , obtain njusing (18) and ni j for i 1; . . . ; pn using (21).

    2. Use (32) to update the Lagrange multiplierni j for i 1; . . . ; pn.

    3. Use (35) followed by (34) to update the Lagrangemultiplier nl j for l 1; . . . ; L.

    4. Solve for the first hop resource allocation tn0;l for l

    1; . . . ; L using (31) to minimize IE

    PKk0P

    Ll1 E

    nk;l.

    5. Obtain the instantaneous resource allocations foreach node tnk;l for k 1; . . . ; K; l 1; . . . ; L using (36).

    4.3 Distributed Implementation

    We describe a distributed approach to implement theresource allocation procedure above where we assume thateach node knows only its own transmit rate Rk, transmitpower Pk;t, and its set of multicast nodes M

    nk . Additionally,

    to avoid added complexity, nodes are only allowed to sendfeedback to their direct upstream node.

    For step 1, n can be computed in a distributed fashionby incrementally updating its second term

    PKk1 w

    nk =Rk

    as follows: Starting from the leaf nodes, each node Mk sums

    the components it receives from its downstream nodes,adds wnk =Rk, and sends the incremental value to itsupstream node. The BS can linearly transform the receivedincremental information to obtain (18) using knowledge ofits multicast tree and transmit rate. Now, ni is easier tocompute because it is path dependent. On each path,starting from the leaf node, each node Mk adds 1=Rk tothe incremental value it receives and sends it to itsupstream node until it reaches the BS which scales it byR0 to obtain

    ni . Next, steps 2-4 are performed at the BS

    with the knowledge of n and ni for each path. Step 5 isperformed in a distributed fashion so that each node

    computes its resource allocation and transmits accordingly.Each node knows the rate at which it receives from itsupstream node Mk0 and its own transmit rate. In addition,the receiver can easily find the resource allocation of itsupstream node by sensing the time it takes to receive allvideo layers. Thus, Mk allocates resources for its transmis-sion according to tnk;l t

    nk0;lRk0 =Rk. This procedure

    does not require the BS or MSs to be aware of the entirenetwork topology or of the SNR on other links.

    The complexity of the operations described in steps 1-5 isobtained as the sum of the individual operations. Findingnj costs OK and finding ni j also costs OK for each

    path. Since the number of paths in a DAG is upper boundedby the number of nodes, the operation cost is OKpn OK2. The complexity of steps 2-4 is dominated by thecomplexity of solving for tn0;l using (31) which is OK for

    1228 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    7/14

    each video layer. For all layers, the cost of obtaining the firsthop allocation becomes OKL. The final step also costsOKL to solve (36) 8k; l. Thus, the complexity of theoptimal resource allocation process for a single video frameand a predefined flow is OK2 KL.

    4.4 Combinatorial Encoding of Network Flows

    After solving for tn0;l over all flows, we can compute the

    energy consumption of flow Fn as nP

    Ll1 tn0;l. Finally, we

    select the optimal flow as

    nj argminn

    nXLl1

    tn0;l j

    !; 37

    where we use the frame index j to stress that the optimalflow may be different in each frame based on theinstantaneous fading state .

    We provide a methodology to count and enumerate allpossible network flows. Since we define a network flow as adirected acyclic graph (DAG), we deduce that there is a one-

    to-one correspondence between the set of network flowsand the set of spanning trees for the network graph. Given aspanning tree, we can obtain the DAG by starting at thebase station and assigning unicast and multicast directedlinks for selected edges such that all nodes are covered.Conversely, each DAG is clearly a spanning tree. Thenumber of spanning tree in a complete graph withm vertices was devised by Cayley as mm2 [36]. For ournetwork of one base station and K mobile stations, weobtain the number of network flows as

    N K 1K1: 38

    Thus, the complexity of brute force flow selection isOK2 KL K 1K1. This complexity presents alimitation for the brute force approach as K increases. For

    instance, in a network with one BS and 6 MSs, there are16,807 possible ways to distribute the content. We will

    propose some approximation algorithms and provide

    performance bounds for these algorithms under specificnetwork topologies.

    Furthermore, Prufer devised a method for encoding anddecoding the set of spanning trees in a graph using what isknown as Prufer sequences. Given a tree with labeledvertices Mkj

    Kk0, the Prufer encoding algorithm outputs a

    unique Prufer sequence of length K 1. The Pruferdecoding algorithm provides the inverse function, that is,given a Prufer sequence of K 1 elements, we can find theset of edges that construct the unique spanning treecorresponding to the Prufer sequence [36]. This provides ahandy tool for implementing the brute force approachcombinatorially to obtain insight into the optimal flowselection and analyze the performance of other approxima-tion algorithms.

    5 APPROXIMATION ALGORITHMS FOR FLOWSELECTION

    Finding the globally optimal distribution strategy requiresconverting each of the K 1K1 Prufer sequences into aspanning tree and finding the minimal energy consumptionusing that tree structure, then choosing the tree that

    minimizes energy consumption among all candidates, andallocating resources accordingly. In this section, we proposetwo approximation algorithms to reduce the complexityinvolved in choosing the best flow for a given fading state.The objective of the proposed algorithms is to avoidsearching through the exponential number of possible treestructures. The first algorithm uses negated SNRs as linkweights on the complete network graph, and finds theminimum spanning tree using these weights. The secondalgorithm is based on selecting a set of dominant flows thatare optimal for a large percentage of fading states for agiven network topology.

    5.1 Minimum Spanning Tree Flow Selection

    To find a suitable flow without using brute force, we shoulddeal with network variables that are independent of theflow structure so that the flow choice is done independentlyand prior to resource allocation. While it is tempting toconstruct the spanning tree using link weights that take intoaccount the energy consumption required to transmit on the

    link, this is not possible because the energy consumptionrequirement is a function of the resource allocation strategyand the set of multicast receivers on that link, which areboth specific to the choice of the network flow. The networkvariable that can be readily used is the instantaneouslink SNR. For video frame j, given the fading statej

    4fk;k0 jg

    K Kk0;k01, we construct the complete network

    graph with edge weights k;k0 j on the link between nodesMk and Mk0 . We then use Prims algorithm [37] to obtain theminimum spanning tree. The spanning tree is mapped tothe corresponding directed acyclic graph representing thenetwork flow, and wireless resources are allocated on that

    flow according to the convex problem in (22) through (25) tominimize total energy consumption. The chosen flow underthis strategy maximizes the sum SNR over the networklinks, or equivalently the sum rate because the shannon rateis a concave function of the SNR. Note that the chosen flowis not necessarily throughput optimal because the actualrate on the link between nodes Mk and Mk0 is notdetermined by k;k0 j. Instead, due to multicast, it isdetermined by the effective SNR on the worst link k mink02Mnk k;k0 which is not known beforehand because itdepends on the choice of n.

    Using this approach, the flow selection problem isseparated from the resource allocation problem. Theflow selection process using Prims minimum spanningtree algorithm costs OE V logV OKK 1 K1 logK 1 OK2 where E KK 1 is the numberof edges in the complete graph and V K 1 is the numberof vertices. Thus, the total time complexity of the flowselection and resource allocation is OK2 OK2 KL OK2 KL as opposed to OK2 KL K 1K1 forthe optimal flow selection. Results presented in Section 6demonstrate that this significantdecrease in complexity costsa limited increase in the average energy consumption invarious network scenarios.

    5.2 Dominant Set Flow SelectionThe second approximation algorithm is based on theobservation that most of the network flows can only beoptimal for a small percentage of the fading states

    ABDEL KHALEK AND DAWY: ENERGY-EFFICIENT COOPERATIVE VIDEO DISTRIBUTION WITH STATISTICAL QOS PROVISIONS OVER... 1229

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    8/14

    corresponding to extreme instantaneous SNRs on thenetwork links. For instance, if MS M1 lies between the BSand MS M2, it is very unlikely that the transmission to M1through M2 is more energy efficient than the transmissionto M2 through M1. We thus attempt to reduce the number ofcandidates by taking into account the network flows thatcollectively correspond to a large percentage of the fadingstates. We refer to this set of network flows as the dominantset. Since we employ a block-fading model, the flows thatare optimal in a percentage p of the fading states are alsooptimal in a percentage p of the video frames for anasymptotically large number of video frames. Thus, we can

    estimate the dominant set using an offline simulation of thebrute force algorithm. After running the offline brute forcesimulation for a large number of frames, we obtain statisticson the flow usage. We sort the flows by percentage of usageand select the sorted flows in descending order such thatthe total usage of the selected set is greater than a threshold.In our simulations, we use a threshold of 90 percent, andcall this the 90th percentile dominant set. As the thresholdincreases, the dominant set solution approaches the optimalsolution but the complexity of flow selection increases. Onthe other hand, a smaller threshold corresponds to a looserapproximation, but reduced complexity.

    Using this approximation scheme, we can achievesolutions asymptotically close to the optimal solution. Infact, we will show that this algorithm exhibits betterperformance than the first one at a higher computationalcost. Despite the asymptotic performance, one majorlimitation in this approach is that it is topology dependent,that is, we have different dominant sets for differentinstances of the MS locations. This makes the algorithmsuitable for low mobility scenarios. However, it is worthnoting that the variation of the dominant set as a function ofthe MS locations is smooth, so that the same set can be usedfor a well-defined set of network topologies. A mobilitymodel can also be used in the process of populating the

    dominant flow set to obtain more accurate statistics on flowuse and better approximations. In general, the moreclustered the network topology and the lower the mobility,the smaller the size of the dominant set. Finally, we shouldnote that although the dominant set construction is not areal-time process, this offline simulation might not alwaysbe computationally feasible if K is somewhat large. In thiscase, we may consider the following alternative approachesto make the dominant set construction feasible:

    1. Populate the dominant set using the minimumspanning tree algorithm: After running the mini-mum spanning tree algorithm for a sufficiently long

    training period, all the flows selected at least oncewill be used to form the dominant set. This trainingphase is computationally very efficient and it mightend up with a superset of the 90th percentile set due

    to the frequent reuse of the good flows, thus itmay perform better.

    2.Use a clustering algorithm to group the mobilestations according to the physical MS locations: Aftergrouping the mobile stations, choose the cluster-heads as the closest MS in each cluster to the BS,perform an optimal flow selection on each groupseparately using the clusterhead as the source, usethe BS to multicast to all clusterheads and use theoptimal flow within each cluster/group.

    3. Place restrictions on the number of flows: Limit thesearch space for dominant set construction, e.g., bylimiting the maximum number of hops of themulicast group size.

    We will show that the number of dominant flows ispolynomial in K unlike the total number of flows becausethe percentage of dominant flows decays exponentially asK increases (See Fig. 8b). For general topologies, thedominant set has size OKa where the exponent a is aconstant that depends on the network topology andmobility dynamics. A good fit typically yields a betweentwo and three. Since the resource allocation problem issolved for each of the OKa dominant flow to obtain thebest dominant flow, the time complexity of the flowselection and resource allocation is OK2 KL Ka.The complexity of the different flow selection algorithmsis summarized in Table 1.

    6 RESULTS AND ANALYSIS

    The network model consists of a base station and K mobilestations M1; M2; . . . ; MK. We assume all K mobile stationsare interested in the same content and the requirement is toselect the best flow for each video frame to be delivered toall receivers reliably based on the current fading state. Togain insight into the flow selection behavior, we consider abasic model where all MSs are at a distance d from the BS,the BS link to Mk and to Mk1 make an angle for allk 1; . . . ; K 1 as shown in Fig. 2.

    Throughout this section, we consider a two layer videostream with constant arrival rates 2 105 bps; 1 105 bps. The signal bandwidth Bkj

    Kk1 1 MHz and the

    time frame duration T 33 ms corresponding to a video

    1230 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012

    TABLE 1Complexity of the Flow Selection Algorithms

    Fig. 2. Simulation model with one BS and K MSs.

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    9/14

    frame rate of 30 fps. We define a delay bound Dth 3T

    100 ms and a delay bound violation probability Pth 103.The transmit power by the BS is P0;t 0:5 W, the transmitpower of each MS is Pk;t 0:05 W 8k and the power(energy per second) consumed by each MS during receptionis Pr 0:05 J/sec. For channel modeling, we derive theaverage SNRs "k;k0 from the distances dk;k0 as follows:

    "k;k0 10 log10Pk;tKdB 10log10dk;k0 10logN0Bk; 39

    where KdB is the pathloss constant, is the pathlossexponent, and N0 is the power spectral density of theAWGN noise. In the simulations, KdB 21:36 dB, 3:52,and N0 4 10

    21 W/Hz.

    6.1 Resource Consumption Analysis

    The cooperative resource allocation algorithm is executedfor 10;000 frames on the network described above withK 3. In each frame, we solve for the optimal resourceallocation using (31) for the optimal flow and the flowselected by the approximation algorithms. Fig. 3a (Top)shows the instantaneous energy consumption in the net-work for a period of 2,500 video frames for the optimal flowselection algorithm.

    To demonstrate the effectiveness of the approximation

    algorithms, Fig. 3a (Middle and Bottom) show theiroptimality gap in energy consumption with respect tooptimal flow selection. Optimal flow selection requires anaverage of 1.366 mJ/frame. The minimum spanning treealgorithm requires only an additional 0.0576 mJ/frame,whereas dominant set flow selection requires an additional0.0064 mJ/frame. Furthermore, it can be seen that there is atransient period at the beginning of each simulation, whichcorresponds to the time required for the Lagrangianmultipliers to stabilize. To confirm the convergence of theLagrangian multipliers to the optimal solution, we presentthe tracking process in Fig. 3b for the two video layers in

    flow F11 (See Fig. 5a). The convergence of the Lagrangianmultipliers to the optimal solution is controlled by the twovariables and defined in Section 4.2. In this simulation, 0:03 and 0:03.

    In Fig. 4a, we compute the energy consumption for eachframe from tn0;l using (17) and (18) where n is selectedaccording to (37). Then, the energy consumption isaveraged over all frames and result is shown for differentvalues of d and . Results show that the network

    ABDEL KHALEK AND DAWY: ENERGY-EFFICIENT COOPERATIVE VIDEO DISTRIBUTION WITH STATISTICAL QOS PROVISIONS OVER... 1231

    Fig. 3. Analysis of the adaptive resource allocation process.

    Fig. 4. Resource consumption analysis under the optimal flow versus d and .

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    10/14

    configuration represented by dand has a key effect on theenergy consumption in the network. At d 200 m and 10o, we require around 0.6 mJ/frame, while at d 1;500m and 40o, we require around 4.3 mJ/frame. Althoughthe transmit powers are fixed, smaller distances provide alarger SNR, thus requiring a lower resource allocation in(31) to satisfy the same statistical delay bound. Eventually,the energy consumption per frame will be reduced due tothe unused time resources.

    In Fig. 4b, we use tn0;l to find the end-to-end normalizedresource allocation for the most resource consuming path

    which can be written as IEmaxifniPL

    l1 tn0;lg. We thenaverage the end-to-end normalized resource allocation over

    all frames for different values of d and . The trend of theresource allocation variation is similar to the energyconsumption, but shows a steeper slope of increase. Resultsshow that at d 200 m and 10o, we require only5 percent of the wireless resources, whereas the wirelessresources are almost fully utilized at d 1;500 m and 40o. This implies that increasing d or further willprohibit maintaining the statistical delay bound guarantee.

    6.2 Flow Selection Analysis

    We are further interested in finding the probability ofselecting a certain flow Fn for a given network topology. Wedefine the probability of using flow Fn as the number offrames transmitted through Fn as implied by (37) dividedby the total number of transmitted frames. For a networkwith K 3, Fig. 5a shows all the 42 16 candidate flows.The flows are ordered according to their Prufer encoding,that is, the first flow is generated from the Prufer sequence1; 1 up to the last flow corresponding to the sequence 4; 4.

    In Fig. 5b, we compute the percentage of flow usage forthe three flow selection algorithms with d 1;000 m, 10o,and K 3 corresponding to 42 16 possible network flows.

    We can see that, in this scenario, three out of 16 flowsdominate the flow usage in the network. These three flowsare BS

    uM1

    uM2

    uM3, BS

    uM2

    mM1; M3, and

    BS u

    M3 u

    M2 u

    M1, and correspond to multihop

    flows that use intermediate MSs M1, M2, and M3, respec-tively. This is explained by the fact that the multicast fromM2 can be done efficiently because of the good channelconditions among MSs and the lower transmit power. Also,sequential unicast through M1 and M3 are two goodcandidates depending on the channel conditions on the firsthop links. Note that the traditional noncooperative flowinvolving three node multicast by the BS is rarely usedbecause it limits the data rate according to the worst SNR,which in turn requires higher resource allocation to providethe same end-to-end transport capacity, thus causing high-

    energy consumption.We also compare the flow usage under the three flow

    selection algorithms. The minimum spanning tree approachbalances the flow usage among dominant flows due to thefact that the flow construction does not differentiate unicastand multicast links. For the dominant set approach, wenotice that the dominant set consists of only three flowsfrom which the flow is selected for each video frame. InFig. 6, we compute the percentage of flow usage for theoptimal flow selection algorithms with d 1;000 m, 10o,and K 5 corresponding to 64 1;296 possible networkflows. Despite the large number of flows, we can see that

    only the best 25 flows collectively form 90 percent of theflow usage. In fact, this provides the motivation behind thedominant set flow selection approach.

    6.3 Energy Consumption Gain Analysis

    In this section, we assess the gain in energy consumptionfor the three flow selection algorithms for differenttopologies and network sizes. To evaluate the cooperationgain, we define the normalized energy consumption as thecooperative energy consumption Ecoop divided by theenergy consumption without cooperation Enocoop, that is,

    Ecoop

    Enocoop ; 40

    where Ecoop is obtained by allocating resources on the flowselected using one of the flow selection algorithms, and

    1232 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012

    Fig. 5. Analysis of flow usage for K 3 using the optimal and the approximation flow selection algorithms.

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    11/14

    Enocoop is obtained by allocating resources on the single-hop non-cooperative multicast flow to minimize energyconsumption and guarantee the statistical delay bound. If < 1, the scheme yields some cooperation gain. Otherwise,cooperation does not provide gains in terms of energyconsumption. With the proposed flow selection algorithm, i s al way s l ess t ha n o r equ al t o 1 , t hat i s, i f thenoncooperative flow is the most energy efficient, resourcesare allocated on that flow to minimize energy consumption.

    Fig. 7a shows the normalized energy consumption while

    varying the network size and the angle for the three flowselection algorithms. An interesting observation is that as Kincreases, the normalized energy consumption decreases,thus increasing the cooperation gain. Although Ecoopincreases as K increases, the rate at which Enocoop increasesis faster which explains this desirable behavior. Also, forlarger , Enocoop does not change, while E

    coop increases, thus

    reducing the cooperation gain. Most importantly, note thesmall optimality gap of the approximation algorithms as

    compared to an optimal flow selection. The dominant set

    flow selection has a very small optimality gap. For

    30o; 20o, and 10o, the optimality gaps are 0.008, 0.005,

    and 0.002, respectively. The minimum spanning tree

    algorithm has optimality gaps of 0.06, 0.03, and 0.015,

    respectively, for the three values of . Furthermore, the

    optimality gap dependence on K is minor.Fig. 7b presents the end-to-end resource allocation on the

    most resource consuming path averaged over video frames

    versus K. As the number of nodes increase, unicasting willrequire more hops to deliver the content, thus larger end-to-

    end resource consumption. Also, the larger multicast group

    size further limits supported rates, thus increasing resource

    consumption. This places a physical limitation on the

    maximum number of MSs that can be accommodated while

    satisfying the statistical delay bound on all the flow paths.

    Moreover, changing the network topology by increasing

    will decrease the average SNR on the mobile-to-mobile

    ABDEL KHALEK AND DAWY: ENERGY-EFFICIENT COOPERATIVE VIDEO DISTRIBUTION WITH STATISTICAL QOS PROVISIONS OVER... 1233

    Fig. 7. (a) Cooperation gain versus K for the optimal and approximation flow selection algorithms using different network topologies represented by, (b) Average end-to-end normalized resource allocation for the most resource consuming path in the optimal flow versus K for different values of .

    Fig. 6. Percentage of flow usage for each of the 1,296 network flow for K 5 using optimal flow selection.

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    12/14

    links, thus increasing the average resource allocationrequirement.

    Fig. 8a shows the percentage of video frames in whicheach of the two approximation algorithms selected theglobally optimal flow. By our construction of the dominantset from the 90th percentile flow use, the dominant setalgorithm will use the optimal flow at least 90 percent of thetime for a simulation long enough. On the other hand, thepercentage drops almost linearly with the minimumspanning tree. But, it is known from Fig. 7a that theoptimality gap only slightly increases with K whichsuggests that the minimum spanning tree algorithm,although seldom uses the globally optimal flow, picks anetwork flow very close to the optimal in terms of energy

    consumption at a much lower computational cost.Finally, to verify that the dominant set size is polynomial

    in the number of flows, it is sufficient to confirm that thepercentage of dominant network flows decays exponentially

    in K. We present the percentage of dominant flows as Kincreases for different topologies in Fig. 8b. Results show

    that the decay rate is indeed an exponential regardless of thenetwork topology and the decay rate does not decrease as

    K increases. For instance, with K 6, the total number ofcandidate flows is 16,807, however, the dominant set size isat most 155 for 30o. This shows that the flow selectionand resource allocation complexity is reduced fromOK2 KL K 1K1 to OK2 KL Ka where ais a constant that depends on the network topologycharacteristics and the mobility level.

    6.4 Case Study: A Large Scattered Network

    We consider a large network with 10 MSs scattered

    randomly around the BS as shown in the configuration inFig. 9. For this network, it is not feasible to apply bruteforce to populate the dominant set since there are 119 2:35 109 candidate flows. Instead, we apply the approach

    1234 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012

    Fig. 8. (a) Percentage of frames using the globally optimal network flow for both approximation algorithms versus K for 10o, (b) The percentageof dominant flows showing exponential decay in K for different network topologies along with the dominant set cardinality for each topology.

    Fig. 9. Scattered network case study. Percentages correspond to the end-to-end normalized resource allocation per path.

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    13/14

    proposed in Section 5.2. That is, we use the minimumspanning tree algorithm to populate the dominant set.After running the minimum spanning tree algorithm for10,000 training frames, we obtain the flows selected at leastonce to be 597. After populating the dominant set, weapply the dominant set flow selection algorithm for 10,000frames to select the best flow in terms of an energyefficiency for each video frame according to the instanta-

    neous fading state. Results show that the two mostdominant flows are collectively used for 38 percent of thetime. These two flows are shown in Figs. 9a and 9b alongwith the average energy consumption per frame for eachflow and the average end-to-end resource allocation oneach path of the flow.

    For the best network flow, an average energy consump-tion of 1.3652 mJ per frame is required and the worstaverage end-to-end resource allocation is 19.47 percent onthe path leading to M8 and M10. For the second-bestnetwork flow, an average energy consumption of 1.3995 mJper frame is required and the worst average end-to-endresource allocation is 14.22 percent on the path leading to

    M8. Note that the end-to-end resource consumption islarger in the best flow than the second-best flow since it hasa larger average end-to-end hop length. Furthermore, thelarger multicast group size by the BS for the second-bestflow limits the data rate and increases the first hop resourceallocation requirement. Since the BS transmit power istypically larger than that of the MSs, this dominates thetotal energy consumption, and the first flow becomes abetter candidate.

    7 CONCLUSION

    We derived the optimal resource allocation solution forscalable video distribution over cooperative multihop net-works to minimize the total energy consumption subject toend-to-end statistical delay bounds per network path. Thesolution is used to identify optimized energy-efficient flowsconsisting of hybrid unicast/multicast links to ensurereliable delivery of the video content to all requesting mobileterminals. Two low complexity approximation algorithmsfor flow selection are proposed and studied in terms ofperformance and complexity. Results demonstrate notablereductions in energy consumption and the performance ofthe approximation algorithms is close to optimal for variousnetwork topologies.

    ACKNOWLEDGMENTS

    This work was partially supported by an NPRP grant fromthe Qatar National Research Fund (a member of the QatarFoundation). The statements made herein are solely theresponsibility of the authors.

    REFERENCES[1] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, Over-

    view of the H.264/AVC Video Coding Standard, IEEE Trans.Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576,

    July 2003.[2] H. Schwarz, D. Marpe, and T. Wiegand, Overview of the ScalableVideo Coding Extension of the H.264/AVC Standard, IEEETrans. Circuits and Systems for Video Technology, vol. 17, no. 9,pp. 1103-1120, Sept. 2007.

    [3] A. Kumar, D. Manjunath, and J. Kuri, Communication Networking:An Analytical Approach. Morgan Kaufmann, 2004.

    [4] C.-S. Chang, Performance Guarantees in Communication Networks.Springer-Verlag, 2000.

    [5] C.-S. Chang and J. Thomas, Effective Bandwidth in High SpeedDigital Networks, IEEE J. Selected Areas in Comm., vol. 13, no. 6,pp. 1091-1100, Aug. 1995.

    [6] D. Wu and R. Negi, Effective Capacity: A Wireless Link Modelfor Support of Quality of Service, IEEE Trans. Wireless Comm.,vol. 2, no. 4, pp. 630-643, July 2003.

    [7] D. Wu and R. Negi, Effective Capacity-Based Quality of ServiceMeasures for Wireless Networks, Mobile Networks and Applica-tions, vol. 11, no. 1, pp. 91-99, June 2006.

    [8] D. Wu, Providing Quality-of-Service Guarantees in WirelessNetworks, PhD thesis, Carnegie Mellon Univ., 2003.

    [9] Q. Du and X. Zhang, Statistical QoS Provisionings for WirelessUnicast/Multicast of Layered Video Streams, Proc. IEEE IN-FOCOM, Apr. 2009.

    [10] X. Zhang and Q. Du, Cross-Layer Modeling for QoS-DrivenMultimedia Multicast/Broadcast over Fading Channels in MobileWireless Networks, IEEE Comm. Magazine, vol. 45, no. 8, pp. 62-70, Aug. 2007.

    [11] H. Wu, C. Qiao, S. De, and O. Tonguz, Integrated Cellular andAd Hoc Relaying Systems: iCAR, IEEE J. Selected Areas in Comm.,vol. 19, no. 10, pp. 2105-2115, Oct. 2001.

    [12] H. Luo, R. Ramjeey, P. Sinha, L.E. Li, and S. Lu, UCAN: AUnified Cellular and Ad Hoc Network Architecture, Proc. ACM

    MobiCom, Sept. 2003.[13] R. Bhatia, L.E. Li, H. Luo, and R. Ramjee, ICAM: Integrated

    Cellular and Ad Hoc Multicast, IEEE Trans. Mobile Computing,vol. 5, no. 8, pp. 1004-1015, Aug. 2006.

    [14] L. Popova, T. Herpel, W. Gerstacker, and W. Koch, CooperativeMobile-to-Mobile File Dissemination in Cellular Networks withina Unified Radio Interface, Intl J. Computer and Telecomm.Networking, vol. 52, no. 6, pp. 1153-1165, Jan. 2008.

    [15] M. Peng and W. Wang, Investigation of Cooperative Relay NodeSelection in Heterogeneous Wireless Communication Systems,Proc. IEEE Intl Conf. Comm., May 2008.

    [16] J.-C. Chen, S.-H. Chan, J.-Y. He, and S.-C. Liew, Mixed-ModeWLAN: The Integration of Ad Hoc Mode with Wireless LAN

    Infrastructure, Proc. IEEE GlobeCom, Dec. 2003.[17] Z. Dawy, S. Davidovic, and I. Oikonomidis, Coverage andCapacity Enhancement of CDMA Cellular Systems via MultihopTransmission, Proc. IEEE GlobeCom, Dec. 2003.

    [18] J. Chen, S. Li, S.-H.G. Chan, and J. He, WIANI: WirelessInfrastructure and Ad-Hoc Network Integration, Proc. IEEE IntlConf. Comm., May 2005.

    [19] K.-J. Peng and Z. Tsai, Distortion and Cost Controlled VideoStreaming in a Heterogeneous Wireless Network Environment,Proc. IEEE Intl Symp. Personal, Indoor and Mobile Radio Comm.,Sept. 2006.

    [20] F. Fitzek and M. Katz, Cooperation in Wireless Networks: Principlesand Applications. Springer, 2006.

    [21] Q. Zhang, F.H.P. Fitzek, and V.B. Iversen, Design and Perfor-mance Evaluation of Cooperative Retransmission Scheme forReliable Multicast Services in Cellular Controlled P2P Networks,

    Proc. IEEE Intl Symp. Personal, Indoor and Mobile Radio Comm.,Sept. 2007.

    [22] M. Ramadan, L. Zein, and Z. Dawy, Implementation andEvaluation of Cooperative Video Streaming for Mobile Devices,Proc. IEEE Intl Symp. Personal, Indoor, and Mobile Radio Comm.,Sept. 2008.

    [23] S. Kang and M. Mutka, A Mobile Peer-to-Peer Approach forMultimedia Content Sharing Using 3G/WLAN Dual ModeChannels, J. Wireless Comm. and Mobile Computing, vol. 5, no. 6,pp. 633-645, Sept. 2005.

    [24] M.F. Leung and S.-H. Gary Chan, Broadcast-Based Peer-to-PeerCollaborative Video Streaming Among Mobiles, IEEE Trans.Broadcasting, vol. 53, no. 1, pp. 50-61, Mar. 2007.

    [25] Q. Zhang and Y. Zhang, Cross-Layer Design for QoS Support inMultihop Wireless Networks, Proc. IEEE, vol. 96, no. 1, pp. 64-76,

    Jan. 2008.[26] L. Zhou, X. Wang, Y. Li, B. Zheng, and B. Geller, OptimalScheduling for Multiple Description Video Streams in WirelessMultihop Networks, IEEE Comm. Letters, vol. 13, no. 7, pp. 534-536, July 2009.

    ABDEL KHALEK AND DAWY: ENERGY-EFFICIENT COOPERATIVE VIDEO DISTRIBUTION WITH STATISTICAL QOS PROVISIONS OVER... 1235

    http://ieeexploreprojects.blogspot.com

  • 7/31/2019 Energy-Efficient Cooperative Video Distribution With Statistical QoS Provisions Over Wireless Networks

    14/14

    [27] L. Zhou, X. Wang, W. Tu, G. Muntean, and B. Geller, DistributedScheduling Scheme for Video Streaming over Multi-ChannelMulti-Radio Multi-Hop Wireless Networks, IEEE J. Selected Areasin Comm., vol. 28, no. 3, pp. 409-419, Apr. 2010.

    [28] D. Zhu and M. Mutka, Cooperation among Peers in an Ad HocNetwork to Support an Energy Efficient IM Service, J. Pervasiveand Mobile Computing, vol. 4, no. 3, pp. 335-359, June 2008.

    [29] B.J. Oh and C.W. Chen, Energy Efficient H.264 Video Transmis-sion over Wireless Ad Hoc Networks Based on Adaptive 802.11eEDCA MAC Protocol, Proc. IEEE Intl Conf. Multimedia and Expo,

    June 2008.[30] G. Ananthanarayanan, V. Padmanabhan, and L. Ravindranath,

    COMBINE: Leveraging the Power of Wireless Peers throughCollaborative Downloading, Proc. Intl Conf. Mobile Systems,

    Applications, and Services (MobiSys 07), June 2007.[31] A.J. Goldsmith, Wireless Communications. Cambridge Univ., 2005.[32] C.-S. Chang, Stability, Queue Length, and Delay of Deterministic

    and Stochastic Queueing Networks, IEEE Trans. AutomaticControl, vol. 39, no. 5, pp. 913-931, May 1994.

    [33] J. Tang and X. Zhang, Quality-of-Service Driven Power and RateAdaptation for Multichannel Communications over WirelessLinks, IEEE Trans. Wireless Comm., vol. 6, no. 8, pp. 3058-3068,Aug. 2007.

    [34] X. Zhang, J. Tang, H.-H. Chen, S. Ci, and M. Guizani, Cross-Layer-Based Modeling for Quality of Service Guarantees inMobile Wireless Networks, IEEE Comm. Magazine, vol. 44,

    no. 1, pp. 100-106, Jan. 2006.[35] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge

    Univ., 2004.[36] B. Wu and K. Chao, Spanning Trees and Optimization Problems.

    Chapman & Hall, 2004.[37] T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to

    Algorithms. McGraw-Hill: MIT Press, 2001.

    Amin Abdel Khalek received the BE degree incomputer and communication engineering withhighest distinction from Notre Dame Universityin 2008 and the ME degree in electrical andcomputer engineering from the American Uni-versity of Beirut in 2010. He is currently workingtoward the PhD degree in electrical and compu-ter engineering at the University of Texas atAustin. His general research interests are at theintersection of wireless communications, video

    coding, and optimization. In 2010, he became a member of the WirelessSystems Innovation Laboratory (WSIL) and the Wireless Networkingand Communications Group (WNCG) at The University of Texas atAustin, where he is currently working on perceptual optimization ofwireless video networks. He is a student member of the IEEE.

    Zaher Dawy received the BE degree in compu-ter and communications engineering from theAmerican University of Beirut (AUB) in 1998 andthe ME and Dr-Ing degrees in communicationsengineering from the Munich University ofTechnology (TUM) in 2000 and 2004, respec-tively. He joined the Department of Electrical andComputer Engineering at AUB in September2004, where he is currently an associateprofessor. He was the recipient of the AUB

    2008 teaching excellence award, the best graduate award from TUM in2000, the youth and knowledge Siemens scholarship for distinguishedstudents in 1999, and the distinguished graduate medal of excellencefrom the Harriri Foundation in 1998. His research interests are in thegeneral areas of computational biology, information theory, and wirelesscommunications with a focus on genomic coding theory, gene networkmodeling, distributed and cooperative communications, cellular technol-ogies, radio network planning and optimization, and multimediatransmission over communication networks. He is a senior member ofthe IEEE, the chair of the IEEE Communications Society LebanonChapter, and a member of the Lebanese Order of Engineers.

    . For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.

    1236 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012

    http://ieeexploreprojects.blogspot.com