Next Article in Journal
Application of Micro-Electro-Mechanical Sensors Contactless NDT of Concrete Structures
Next Article in Special Issue
Evaluation of Three State-of-the-Art Classifiers for Recognition of Activities of Daily Living from Smart Home Ambient Data
Previous Article in Journal
Comparison of sEMG-Based Feature Extraction and Motion Classification Methods for Upper-Limb Movement
Previous Article in Special Issue
Nonlinear Optimization-Based Device-Free Localization with Outlier Link Rejection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

by
Ahmad Mohamad Mezher
1,*,
Mónica Aguilar Igartua
1,
Luis J. De la Cruz Llopis
1,
Esteve Pallarès Segarra
1,
Carolina Tripp-Barba
2,
Luis Urquiza-Aguiar
1,
Jordi Forné
1 and
Emilio Sanvicente Gargallo
1
1
Department of Network Engineering, Universitat Politècnica de Catalunya (UPC),C. Jordi Girona 1-3, Barcelona 08034, Spain
2
Faculty of Computer Science, Autónomous University of Sinaloa, Mazátlan 82107, Mexico
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(4), 9039-9077; https://doi.org/10.3390/s150409039
Submission received: 19 February 2015 / Revised: 6 April 2015 / Accepted: 14 April 2015 / Published: 17 April 2015
(This article belongs to the Special Issue Sensors and Smart Cities)

Abstract

: The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

1. Introduction

A Mobile Ad hoc NETwok (MANET) is a group of self-organized wireless mobile nodes (MNs) able to communicate with each other without the need of any fixed network infrastructure nor centralized administrative support. MANETs suffer from link breakages due to nodes that move and have limited battery life, which produce frequent changes in the network topology. In addition, the transmission range in such mobile devices is limited, so multi-hop paths as well as efficient routing protocols will be needed. Each MANET node will operate both as a terminal host and as a forwarding node. MANETs should adapt dynamically to be able to maintain communications despite of all these issues [1].

MANETs have attracted much attention from the research community over the last years and important technical advances have risen. These multi-hop networks are foreseen as an important kind of next generation access networks, where multimedia services will be demanded by end users from their wireless devices everywhere. In many situations and areas, users may spontaneously form an infrastructureless ad hoc network to share their resources and contents. Besides, MANETs can be used together with existing cellular networks forming a hybrid cellular-ad hoc network as MANETs can extend the coverage, capacity and interconnectivity of current cellular networks [2]. Multimedia services require Quality of Service (QoS) provision. The special characteristics of MANETs, such as mobility, dynamic network topology, energy constraints, infrastructureless and variable link capacity, make the QoS provision over these networks an important challenge. In particular, instead of using fixed network configuration parameters, a better solution would be to adjust the framework parameters according to the current environmental conditions.

On the other hand, smart city applications are promising new services that involve vehicles, drivers, citizens and city infrastructure are about to emerge. Smart city applications could be used in emergency situations that require the coordination and collaboration between implicated parts in order to treat urgently the wounded who have suffered an accident. Emergency prevention and response are key issues for smart cities to face any kind of sudden incident such as traffic accidents, traffic jams, public transport delays, etc. For example, when an accident happens, dynamic sensors (e.g., citizens with smart phones) could make a video of the accident and send it through the MANET. With a video message, the level of seriousness of the accident could be better interpreted by the authorities (i.e., health care unit, police, ambulance drivers, etc.) than with a simple text message. In this way, dynamic sensors could participate in reporting a situation in the city using the MANET network so it would be possible to have a quick answer warning citizens and emergency units. The prevention of accidents is one of the most important goals in smart cities, and nowadays Information and Communication Technologies (ICTs) and citizens play an essential role in this field.

A good management of video-warning messages after accidents would lead to an immediate call to health agencies and ambulances. In these kinds of situations, MANETs [1] and citizens play an important role in the new smart cities. Nowadays, a high percentage of citizens carry at least one smart communications device in their pockets or bags. In the smart cities, citizens are welcome to participate and interact with the management of their city. Diverse kind of data could be gathered from the smart phones or tablets of volunteers, e.g., mobility information or need for health care after an incident in the city. This way, the public administration would have an interactive network of citizens who actively participate in the management of the city. It would be possible to have a quick answer to solve daily problems and help the emergency units (e.g., police, ambulances, health care units) in case of incidents (e.g., traffic accidents).

Our research focuses on the deployment of an efficient multipath routing protocol to manage video-warning messages in MANETs. In this work, we aimed to design a dynamic selection of the data forwarding paths using a game-theoretical approach plus a multipath multimedia routing protocol that we previously introduced in [3]. This contribution seeks to further enhance the overall performance of the service.

The rest of the paper is structured as follows. Section 2 includes some relevant related work. In Section 3 we summarize the features of our multipath routing protocol. Section 4 gives a brief explanation of the game-theoretical proposal. Section 5 describes analytically our novel game-theoretical model to send video-warning messages over MANETs. Section 6 describes a method to calculate a specific parameter of the model. Simulation results are shown and analyzed in Section 7. Finally, conclusion and future work are given in Section 8.

2. Related Work

Routing is the process of selecting the best path or paths in a network through which data will be forwarded. Forwarding paths are not necessarily the shortest ones and are selected usually seeking to improve the service performance. Proposals of routing protocols for ad hoc networks similar to our work can be classified in four categories: (a) single path routing; (b) general multipath routing; (c) multipath routing used to transmit video; and (d) game-theoretical algorithms used in the routing. In the following we summarize some representative works related to our proposal for each category.

(a)

Regarding single path routing, many protocols were designed in the last years for MANETs [4-10] based on improvements of basic and widely referenced ad hoc routing protocols such as ad hoc on-demand distance vector (AODV) [11] and dynamic source routing (DSR) [12]. Based on AODV, [4] incorporates an admission control scheme and a feedback scheme to satisfy the QoS-requirements of real-time applications; [5] adds a route fragility coefficient (RFC) as a metric to find stable routes; [6] proposes an efficient algorithm to balance energy consumption among all participating nodes; and [7] provides n backup routes in case of link failure instead of one. On the other side, based on DSR, [8] presents a pragmatic scheme to establish and sustain trustworthy routes in the network; [9] introduces a new route maintenance strategy called distance based route maintenance (DISTANCE) to prevent link failure; and [10] uses the ant colony optimization (ACO) algorithm producing a significantly improvement in terms of packet losses, end-to-end delay, routing overhead and energy consumption.

(b)

Some works like [1317] tackle the congestion problem present when the MANET is heavily loaded, since this factor negatively affects the packet losses. To cope with this issue, multipath routing protocols were proposed to alleviate congestion, optimize the use of the scarce MANET resources, increase the packet delivery ratio and improve the offered quality of service. For example, authors in [13] proposed the congestion-adaptive routing protocol (CRP) to prevent congestion. Simulation results show that CRP improves significantly the packet loss rate and the end-to-end delay compared to AODV and DSR. In [14], the authors introduced a type of service aware routing protocol (TSA) which uses both the packet type of service and the traditional hop count as route selection metrics. This proposal tries to avoid congestion by distributing the load over a potentially greater area. A linear load balancing protocol using multiple paths is proposed in [15], where n routes are sorted in increasing order of their hop count and have assigned priority values so that the shorter the path the higher the priority of the path to be selected to distribute the transmitted packets. In [16], the authors introduced a mechanism to find a primary forwarding route using the basic AODV engine and an alternative backup path to be used when the main route is broken. The backup path excludes nodes already used in the primary path, so that they are node-disjoint paths. The work [17] presented the Fibonacci multipath load balancing protocol (FMLB) for MANETs to distribute transmitted packets over multiple paths through the mobile nodes using an algorithm based on the Fibonacci sequence.

(c)

Multipath routing protocols offer interesting benefits to increase the available bandwidth, which is suitable to transmit video over ad hoc networks where the bandwidth is a scarce resource. Several works such as [1822] presented interesting approaches to transmit video flows over multipath frameworks. In [18], the authors analyzed the topic of multipath routing for multiple description video coding in wireless ad hoc networks. They found that genetic algorithms (GAs) are effective to address this type of cross-layer optimization problems. They demonstrate using numerical results the superior performance of their GA-based approach. In [19] the authors proposed an optimal routing algorithm to distribute video over multiple paths seeking to minimize congestion and to improve the video quality. In [20] the authors designed an adaptive multipath multimedia dynamic source routing (MMDSR) protocol able to self-configure dynamically depending on the state of the network while taking into account the special features of the video frames to distribute them over the multipath scheme. The authors in [21] proposed an extension of multipath optimized link state routing protocol (MP-OLSR) named fuzzy-based quality of service MP-OLSR (FQ-MP-OLSR) integrating two fuzzy systems. The first is used to calculate a multi-constrained QoS metric based on delay, throughput and signal to interference plus noise ratio (SINR) while the second is applied to adapt cost functions used to penalize paths previously computed by the Dijkstra's algorithm. Simulation results showed that FQ-MP-OLSR achieves a significant improvement in terms of QoS and quality of experience (QoE). The work in [22] presented a QoS-aware routing framework combining three QoS mechanisms, i.e., cross-layer communication mechanism, session admission control and QoS-aware multipath routing to achieve an efficient video transmission over MANETs. Simulation results showed the improvement obtained in terms of video quality.

(d)

Concerning the application of game theory in the routing for ad hoc networks, works in the literature deal mainly with two important issues: proposals that include incentives to encourage nodes to cooperate [23,24] and proposals that apply game theory to attain a QoS-aware framework [2527]. In the case of MANET nodes that do not belong to a single authority, nodes do not have a common goal and seek to maximize their own utility trying to save their limited resources by reducing packet forwarding for others. Besides, mobility in MANETs causes hard challenges in the provision of the QoS required to distribute multimedia data. In [23], an analysis of cooperation incentives provided by reputation systems, price-based systems and an incentive strategy using game theory was presented. Also, the authors proposed an integrated system combining the previous strategies. Results clearly prove the benefits of the integrated system over the individual reputation system and the price-based system in terms of cooperation's effectiveness as well as in selfish node detection. In [24], the authors presented a novel incentive scheme for probabilistic routing which stimulates selfish nodes to participate. Results showed a 75.8% gain in delivery ratio compared to the case of a probabilistic routing providing no incentive. In [25], a dynamic probabilistic protocol based on game theory, called forwarding game routing protocol (FGRP), was introduced for the selection process of the forwarding nodes. In this protocol, a node is a player of the forwarding game and takes the forwarding decision upon the reception of a flooding packet. Each node tries to maximize its utility by selecting an appropriate strategy. Simulations show the benefits of FGRP in terms of end-to-end delay and packet delivery ratio. Current works in the literature that are similar to ours are [26,27]. In [26] the authors use game theory to design a self-optimizing algorithm to minimize the end-to-end delay in a multi-class MANET. The approach consists of a fully distributed algorithm based on AODV for which they analytically prove that it reaches an optimal routing for each user in terms of delay, and which also minimizes the overall delay in the network. They apply a potential game that meets the principle of individual optimization provides a global optimal configuration. They include a numerical evaluation that shows improvement compared to AODV. In our case, we use a multipath (instead of only one path) forwarding scheme to transmit real video (instead of Poisson traffic) and we use several metrics (instead of only using the delay) to arrange the paths. The work [27] studies the optimal forwarding problem in MANETs based on a generalized two-hop relay (the source node replicates copies of its packets to other relaying nodes so that each packet travels at most two hops to reach its destination) with limited packet redundancy f (f-cast, each packet can be replicated to at most f different relaying nodes) for packet routing. They propose a forwarding game where each node i individually decides a probability pi to send its own traffic and helps to forward other traffic with probability 1 − pi. The payoff for a node is the achievable throughput capacity of its own traffic. They obtain the optimal forwarding strategy that each node should adopt to ensure the optimum per node throughput capacity. Similarly to us they also mathematically derive a per node forwarding probability using game theory, although in their case it is used by a node to send/forward or not a packet, whereas in our case it is used by a node to decide if it sends a video frame through the best path or through the second best one. Besides, we use different forwarding schemes.

In this present work, we deal with the issue of QoS provision and leave cooperation encouragement for future work. After analyzing the multipath routing protocols presented in this section, for our purpose of distributing video messages over MANETs and VANETs, the most suitable approach as a reference are our previous proposals MMDSR [20] and g-MMDSR [3]. MMDSR is a QoS-aware self-configured multipath routing protocol that dynamically adapts to the changing environment, whereas g-MMDSR enhances MMDSR by including a 2-player game-theoretical algorithm in the forwarding scheme. To the best of our knowledge, the aim to apply together a QoS-aware multipath routing scheme and a multi-user game-theoretical approach that includes the particular features of the video frames into the game model to efficiently distribute video warning messages over ad hoc networks in smart cities is novel. In this work, the multipath routing scheme of MMDSR is enhanced by including a multi-user game-theoretical algorithm so that competing nodes share the scarce resources in a more suitable and efficient way. Our previous proposal [3] introduced a 2-player game-theoretical routing scheme to improve MMDSR, and in this present work we will develop a general multi-player game-theoretical routing protocol. In the next section, we summarize MMDSR in a nutshell.

3. Multipath Multimedia Dynamic Source Routing (MMDSR)

In this section, we give a brief summary of the main features of the MMDSR routing protocol, whose detailed description was presented in [3]. In this present article, we further improve the routing scheme by designing a novel game-theoretical model to provide video-streaming in MANETs. The framework is able to provide video-streaming services over IEEE 802.11e [28] MANETs and to dynamically adapt to the changing network conditions inherent in MANETs.

3.1. Basics of the General Framework

The multipath routing scheme of MMDSR is based on the DSR (Dynamic Source Routing) protocol [12] to find available paths from source to destination. Video is distributed using RTP/RTCP (Real-time Transport Protocol/Real-time Control Protocol) [29] over UDP as transport protocols. Our system uses a layered MPEG-2 VBR coding of the video flow, which is formed by sets of frames, usually 4 to 20 frames, called GoP (Groups of Pictures), see Figure 1. A GoP has three types of frames: I, P and B, and has a unique frame-pattern in a video repeated in each GoP. I (Intra) frames encode spatial redundancy, they form the base layer, provide a basic video quality and carry the most important information for the decoding process at the receiving side. The whole GoP would be lost if the corresponding I frame were not available at decoding time. P (Predicted) and B (Bi-directional) frames carry differential information from preceding (P) or preceding and posterior (B) frames, respectively. Considering these characteristics, we assign different priorities to the video frames according to their importance within the video flow. Therefore, I frames should have the highest priority, P frames the medium priority and B frames the lowest one.

In the MAC (Media Access Control) layer, we use the IEEE 802.11e [28] standard, which provides QoS support. It consists of four different Access Categories (AC), each with their own configuration parameters, i.e. contention window minimum (CWmin) and maximum (CWmax), arbitration interframe space (AIFS) and transmission opportunity (TxOp). Each packet from the higher layers arrives at the MAC layer with a specific priority value and is mapped into the proper AC. We defined the mapping of the different packets into each one of the four ACS as follows:

  • AC0: signaling.

  • AC1: high priority packets (I frames).

  • AC2: medium priority packets (P frames).

  • AC3: low priority packets (B frames + other best effort traffic).

3.2. Multipath Routing Scheme in MMDSR

MMDSR is a multipath routing protocol that uses the standard DSR as the engine to search for available paths. MMDSR uses up to three paths through which the three types of video frames will be sent. As Figure 2 shows, traditionally the most important video frames (I frames) would be sent through the best available path, P frames through the second best path and B frames through the third best path (worst one). In our results, we obtained that there are notable benefits in arranging two or three paths to transmit the video frames. However, arranging more than three paths in a multipath scheme does not provide a big improvement, while increases unnecessarily the management. Similar results were obtained in [30].

The user requirements are negotiated using QoS parameters to provide the required image quality. We use the following parameters: minimum expected bandwidth (BWmin), maximum percentage of packet losses (Lmax), maximum delay (Dmax) and maximum delay jitter (Jmax).

user _ req { B W min , L max , D max , J max }

3.3. MMDSR Control Packets

Decisions such as path selection or tuning of configuration parameters are operated from the source. MMDSR periodically discovers AP available paths between source and destination by sending monitoring Probe Message (PM) packets. After that, a Probe Message Reply (PMR) packet is generated at destination to carry the collected information about the quality of the available paths. The reduced size of these packets (around 64 bytes, depending on the number of paths found out) and the low frequency of sending them (every 3–18 s depending on the network state, see Equation (4)) makes the incurred overhead almost negligible. Figure 3 shows PM and PMR packets which are periodically interchanged between source and destination.

Then, a score is given to each one of the paths after analyzing the feedback information at the source node to classify them accordingly. That score is updated continuously after the reception of each PMR packet. Looking at the QoS parameters of the paths, the source selects three paths (if it is possible, or less if it is not) to compose the multipath scheme. The vector path state k j contains all the quality parameters calculated for each one of the available paths:

path state k j { B W , L , D , J , H , R M , M M } k j
where j is the iteration number of the algorithm and k refers to each one of the paths (with kAP). The QoS parameters are: available bandwidth ( B W k j), percentage of packet losses ( L k j), delay ( D k j), delay jitter ( J k j), hop distance ( H k j), reliability metric ( R M k j) calculated from the SNR (Signal to Noise Ratio) of the links involved in each path, and mobility metric M M k j calculated from the relative mobility of the neighboring nodes within each path. The last two metrics were previously proposed in [3].

This process is repeated periodically to refresh the paths since the topology of MANETs vary and might produce link breakages. The routing period depends on the network state, as it is explained in Section 3.5.

3.4. Path Classification in MMDSR

Once the source has selected a set of paths that fulfil the requirements depicted in Equation (1), the classification of those paths is done by checking sequentially the qualifications of the QoS parameters, according to the following list:

R M k j + M M k j , H k j , B W k j , L k j + J k j and D k j .

We first arrange the available paths looking at the metrics RM and MM, since we prefer the most reliable and stable paths to distribute video over MANETs. In case of draw, the decision is taken depending on the hop-count metric (H) which decides the shortest path. In case of another draw, we consider bandwidth (BW), then losses (L) and delay jitter (J), and finally delay (D). Nonetheless, other alternative algorithms to arrange the available paths could also be considered. Finally, the source selects the k paths (with kAP) required to compose the multipath routing scheme. In our case, k = 3 paths. Notice that if only two paths were available, we still could differentiate both paths (i.e., the best and the medium-quality path), but if only one was available then all the packets would be sent through that single path.

3.5. MMDSR Self-Configuration

Due to the highly variable network topology of MANETs, any proposed routing protocol should be dynamic. Having this in mind, MMDSR is able to self-configure. Here, we will just point out the basics of the self-configuration operation.

Our framework monitors the current state of the network and in case of changes, the algorithm modifies the routing period of the algorithm and the thresholds to classify paths. We adjust those parameters dynamically depending on a parameter called NState, which brings information about the global network state and is updated by the algorithm iteration by iteration. NState is computed as follows:

NState j = w R M R M j ¯ + w M M M M j ¯ + w B W B W j ¯ + w L L j ¯ + w D D j ¯ + w J J j ¯ + w H H j ¯

In Equation (3), the upper bars denote averages and the ws are the weights assigned to each metric. When the source receives the feedback from the network by means of PMR packets, it calculates the NState using Equation (3) from the QoS parameters of all the k paths (see Equation (2)) on that itereation j.

The routing period (Trouting) to refresh the multipath scheme also varies dynamically and is calculated according to Equation (4), so that when the network is behaving well (i.e., NState is high), Trouting is also high and the paths that form the multipath scheme will be used longer. Conversely, if the network is behaving bad (i.e., NState is low) then Trouting is low and the paths are refreshed sooner.

T routing j + 1 = γ NState j + θ

To obtain the previous equation, a high number of simulations were conducted under a wide range of network conditions where the network performance was good, normal and bad. For the scenario under consideration (also used in the present paper), the obtained values were γ = 10 and θ = 3.

Till now, we have summarized the basics of the previous QoS-aware adaptive multipath routing protocol [3]. Next, we introduce our novel game-theoretical routing scheme to further improve the transmission of video over MANETs.

4. A Game-Theoretical Routing Protocol for MANETs

Game Theory is a branch of applied mathematics that has been used basically in economics to model competition between companies. During the last years, Game Theory has also been used in networking to solve routing and resource allocation problems in a competitive environment. MANET nodes take decentralized decisions, and resource management mechanisms can help those nodes to behave constructively improving the network performance as a whole [31]. In this work we apply Game Theory in the multipath routing protocol to further improve our proposal. We assume that each source node has a set of I, P and B video frames of a video flow to be transported; also, we assume that each source has three paths through which those frames could be sent. Nodes play a routing game to distribute the video flows seeking their own best performance. The players of the game are the MANET nodes and the action of the game is to select the proper route to forward their video-streams. In the following section, we will introduce the game-theoretical proposal included in the multipath routing scheme.

4.1. The Bases of Our Proposal

Figure 4 shows the proposed architecture. We assume N connections (S1-D1, S2-D2,…, Sn-Dn) and three paths. It is likewise possible to apply the proposal to any MANET independently of the number of connections, nodes and paths.

Traditionally, nodes always would try to send the most important video frames through the best available path obtained by the multipath routing protocol. This means that I frames, which are the biggest ones and carry the most important video information, will be sent through the best path, whereas the least important frames (i.e., B frames) will be sent through the worst one. Nevertheless, if each node sends the most important frames through the best path, this path could get congested. As a consequence, that best path could suffer more losses than the others, which would lead to classify it as a worse path. This behavior could produce an oscillatory performance that might affect the video experience of users if it happened frequently.

To cope with this issue, users could play a game such that the best two paths (best, medium) could be selected by each player to transmit the most important video frames (i.e., I+P frames). That is, each user could prefer to send sometimes the most important frames through the medium-quality path. Just for simplicity, B frames are considered always to be sent through the third path, which is the worst one. Also, I and P frames belonging to the same video stream are going to be sent through the same path to make more evident the inconveniences of sharing the same path, since there are more P frames than I frames per flow.

In our game, in each iteration, users select paths for their respective video flows. As it is shown in Figure 5, we have three possible situations. Without playing the game, all users would always send the important frames through the best path (Figure 5a). Alternatively, they could play our routing game. Notice that case (Figure 5b) is worse than (Figure 5a) for all users since they are sending their frames together through the medium-quality path (this should not happen often). In the third case (Figure 5c), I+P frames will be sent through the best available path by each user with a certain probability p and through the second best path available with a probability 1 − p.

Notice that players (users) must decide their choices simultaneously and without communicating with each other. If we have a number of I+P frames equal to F to be sent, depending on the p value, a number of I+P frames equal to F1 will be sent through the best path and a number of I+P frames equal to F2 will be sent through the medium-quality one, being F = F1 + F2. M represents the number of B frames to be sent, always through the worst path.

In the next section we will compute the optimal probability p (called p*) of sending I+P frames through the best path that produces the best outcome for each player.

5. Game-Theoretical Routing Scheme for Video-Streaming in MANETs

A game can be described by listing the players participating in the game, a set of strategies for those players, and a specification of payoffs for each combination of strategies. Let S be a finite set of N players 1,…, N. Each player i has a finite set of available actions Ai. Let aiAi be each particular action chosen by player i. The action space, A, is the cartesian product of all Ai, i.e., A = A1 × A2 × … AN. An N-tuple action, a, is a point in the action space A. A pure strategy provides a complete definition of how a player will play a game. In particular, it determines the move a player will make for any situation it could face. A mixed strategy of player i, αi, is an assignment of a probability, piP = [0,1], to each pure strategy. This allows a player to randomly select among the set of pure strategies. Let α = (α1, α2,…, αN) be the mixed strategy profile, then the probability that a particular N-tuple action, a = (a1,a2,…,aN), will occur, p(a), is formed from the product of the probabilities assigned to a by α. Let ui be the utility function of player i in the strategic form game occurring in each stage. The utility function is a mathematical description of preferences that maps the action space to a set of real numbers. A utility function for a given player assigns a real number for every possible outcome of the game, so that a higher number implies that the outcome is more preferred.

u i : A R

Ui(α) is the expected utility for player i for the mixed strategy profile α, and has the following expression:

U i ( α ) a A p a u i ( a )

A strategic game G can be expressed using three primary components: the set of players S, the action space A, and the set of individual utility functions for player i, ui.

G = ( S , A , u i )

A mixed strategies extension to G is given by the next expression, where Δ(Ai) is the set of all probability distributions over Ai and Ui is the set of all expected utilities to i.

G = ( S , Δ ( A i ) , U i )

A best response is a strategy which produces the most favorable outcome for a player, taking other players' strategies as given. A Nash Equilibrium (NE) [32] is a solution in which each player plays a best response to the strategies of other players. Each player is assumed to know the strategies of the other players, and no player has incentive to unilaterally change their current strategy while the other players keep theirs unchanged. Players are in equilibrium if a change in strategies by any one of them would lead that player to earn less than if they remained with their current strategy. It is a mathematical fact that every mixed extension of a strategic game has at least one mixed strategy Nash equilibrium [32].

To define best responses more generally, we need a notation for the set of strategies used by all players other than player i, named αi:

α i = ( α 1 , , α i 1 , α i + 1 , , α N )

Strategy α i * is a best response for player i to the strategies of all players except i, α i * if:

U i ( α i * , α i * ) U i ( α i , α i * ) , α i Δ ( A i )

This means that if α i * is a best response for player i to the assumed set of strategies α i * played by the other N-1 players, then it must give player i a payoff at least as large as the player would get if they placed any other strategy αi from their set of allowed strategies. Equivalently, a best response (BR) correspondence to player i is given by :

α i * B R i ( α i ) = argmax α i Δ ( A i ) U i ( α i , α i )

Let us remark that argmaxxF(x) is the value of x for which F(x) has the largest value. A joint strategy α * = ( α 1 * , , α N * ) is a NE if, for each player i, α i * is a best response to α i *.

Remember that every finite game (finite number of players, each of which with a finite set of strategies) has Nash equilibria in either mixed or pure strategies [33,34].

5.1. The Benefit of Using a Particular Path to Transmit the I+P Video Frames

Before defining the player's utility of the game, we will define a parameter that evaluates the benefit of using a particular path. As we have mentioned before, we assume that we always have at least two available paths (best and medium-quality paths) to send packets. Each path will have its own benefit as we describe next.

Definition: The benefit of a pathk is:

β k = { ϕ k , if the path fulfills the Qos requirements ( see Equation ( 1 ) ) 0 , otherwise
where ϕk ∈ ℝ*.

Let us assign ϕk = ϕb as the benefit for the best path and ϕk = ϕm as the benefit for the medium-quality path, where ϕb and ϕm ∈ ℝ*. Later, we will relate ϕb and ϕm with the subjective QoS experienced by the users regarding the video frames received from each path (see Equation (23)). Strategy αi is defined as follows:

α i = { Transmit using the best path . Transmit using the medium-quality path .

Probability p is the probability of sending (I+P) frames through the best path and probability (1 − p) is the probability of sending those frames through the medium-quality path.

5.2. Design of the Utility Function

The utility function Ui designed for our game-theoretical routing protocol aims at achieving two goals: Minimizing the rate of (I+P) frames lost and minimizing the delay jitter, since these two parameters are most significant in video-streaming services. An initial short delay can be easily bearable by the user. Part of that delay would be produced after gathering frames in the reception buffer to reorder frames before the decoding process. The proposed utility function for player i is the following:

U i = ( n r b , i n s b , i n s b , i ) ϕ b , i p i 2 J b , i Best path + ( n r m , i n s m , i n s m , i ) ϕ m , i ( 1 p i ) 2 J m , i Medium path

All variables presented in Equation (14) are defined in Table 1.

Now let us relate nsb,i and nsm,i with ns,i:

n s b , i = p i n s , i
n s m , i = ( 1 p i ) n s , i
where ns,i = nsb,i + nsm,i.

Substituting Equations (15) and (16) in Equation (14) we get the following:

U i = ( n r b , i p i n s , i p i n s , i ) ϕ b , i p i 2 J b , i Best path + ( n r m , i ( 1 p i ) n s , i ( 1 p i ) n s , i ) ϕ m , i ( 1 p i ) 2 J m , i Medium path

Notice that each player makes his/her own path classification, i.e., each player might have different best and medium-quality paths.

In Equation (14), we have made our utility function Ui to be proportional to the negative of the I+P frames losses. This way, the utility increases as the losses decrease, for both the best and the medium-quality paths. Besides, Ui is a concave function so that we ensure to have a p value that produces the maximum utility. In Equation (14), ( n r b , i n s b , i n s b , i ) is the negative of the I+P frame losses through the best path and ( n r m , i n s m , i n s m , i ) is the negative of the I+P frame losses through the medium-quality path.

Besides, Ui is proportional to the benefit of the path (βk, expressed in Equation (12)), that equals ϕb and ϕm for the best and the medium-quality path, respectively. Finally, Ui is inversely proportional to the jitter delay, so that the utility increases as the jitter delay decreases. This is reflected as ( 1 j b , i) and ( 1 J m , i), for the best and the medium-quality paths, respectively. We can see a numerical example of the utility function in Section (7.2.3).

Depending upon the values of the utilities, pure strategies may not exist, but in that case there are always mixed strategies [33,34]. The mixed strategy α i * is a (NE) if the utilities Ui(i = 1,…,N), satisfy Equation (11). If there exists a mixed Nash equilibrium, player i will have a best response. To obtain it, Ui must be maximized:

U i p i = 0

For the sake of a simpler writing we will omit the i index to refer the user in the previous variables shown in Table 1. Thus, we will use nsb instead of nsb,i, and so on.

Then, applying Equation (18) in Equation (17) we obtain:

U i p i = 2 p i ( ϕ b J b + ϕ m J m ) + ϕ b J b n r b n s ϕ m J m n r m n s + 2 ϕ m J m

To simplify the previous equation, we assume that Jb, Jm, nsb, nsm and ns are greater than zero. This assumption has sense since a jitter equal to zero is very improbable and at least one frame should have been sent as well. We define the following variables:

ϕ ^ b = ϕ b J b , ϕ ^ m = ϕ m J m , n ^ b = n r b n s , n ^ m = n r m n s

Next, we substitute Equation (20) in Equation (19) and we get:

U i p i = 2 p i ( ϕ ^ b + ϕ ^ m ) + ϕ ^ b n ^ b ϕ ^ m n ^ m + 2 ϕ ^ m

Then, by combining both Equations (18) and (21), we attain the solution for the best probability of sending (I+P) frames through the best path, that gives a NE in the utility function Ui. This is called as the best response of the game. Thus, using p i * to compute the probability of sending I+P frames through the best path, is a strategy which produces the most favorable outcome for player i, taking the other players' strategies as a given.

p i * = ϕ ^ b n ^ b + ϕ ^ m ( 2 n ^ m ) 2 ( ϕ ^ b + ϕ ^ m )

This way, each player i will continuously update his/her best response p i * using Equation (22). To do so, the user easily obtains from the RTCP feedback packets: the number of I+P frames received so far from the best and the medium-quality paths (nrb and nrm, respectively), the number of I+P frames sent so far (ns) and the jitter delay through the best and the medium-quality paths (Jb and Jm, respectively). In the next section, we explain how the user computes the benefits for the best and the medium-quality paths.

5.3. Paths' Benefits Computation

We have designed the value of the benefit of a path to be proportional to the subjective video quality perceived by the user regarding the video frames received from that path. In this work, we use the MOS (Mean Opinion Score) as a measure of the subjective QoS.

Accordingly, we define the following equations to compute the benefits of the best and medium-quality paths, ϕb and ϕm, respectively:

ϕ b = k b MOS b and ϕ m = k m MOS m
where kb and km are constants, [kb, km] ∈ ℝ*.

Notice that kb and km cannot equal zero because in this case, ϕb and ϕm would be zero too, which means that both paths would not satisfy the QoS parameters (see Equation (12)). The first condition for a path to be used by the sources is Equation (12); otherwise that path would not be taken into consideration.

Substituting Equation (23) in Equation (20), we get

ϕ ^ b = ϕ b J b = k b MOS b J b and ϕ ^ m = ϕ m J m = k m MOS m J m

Next, using Equation (24) in Equation (22) we have this expression for the best response probability, p i * :

p i * ( k b MOS b J b ) n ^ b + ( k m MOS m J m ) ( 2 n ^ m ) 2 ( k b MOS b J b + k m MOS m J m )

Let k b k m = k b / m. As km is different from zero, we can divide the whole equation Equation (25) by km. After substituting, we obtain the Nash Equilibrium strategy for player i:

p i * ( k b / m ) = ( k b / m MOS b J b ) n ^ b + ( MOS m J m ) ( 2 n ^ m ) 2 ( k b / m MOS b J b + MOS m J m )

We designed Ui to be a concave function, so that there is one p* value where Ui is on its maximum value. Due to that, 2 U i 2 p i must be less than zero. This way, deriving Equation (21) we obtain:

2 U i 2 p i = 2 ( ϕ ^ b + ϕ ^ m )

As we need that 2 U i 2 p i < 0,

ϕ ^ b + ϕ ^ m > 0 ; [ ϕ b , ϕ m ] * , [ J b , J m ] + *

Concluding, if player i adopts the strategy to send his/her (I+P) frames through the best path with a certain probability that equals p i * (see Equation (26)), his/her own benefit and the whole benefit of the network will be the highest.

All values needed to compute p i *, except kb/m, can be obtained during normal network operation from the feedback information given by the RTCP packets. This way, users will update the probability p i * with the current QoS parameters carried in the last received RTCP packet. Thus, kb/m is the single pending parameter to be obtained in Equation (26). In the next section, we will give a method to calculate analytically this parameter.

6. A Method to Calculate kb/m

MOSb and MOSm are the mean opinion score values measured in the best and the medium-quality path, respectively. They can take any value between 1 and 5, where 5 means Excellent, 4 means Good, 3 Fair, 2 Poor and 1 Bad. After making a video-streaming test, we obtained the following results shown in Table 2 and Figure 6. For further information about the test please see the Appendix A.

Now, our goal is to calculate kb/m so we can compute the value of p i * using Equation (26). Three conditions will limit the computing of kb/m: 0 ≤ pi ≤ 1 and Ui being a concave function. Below, we will study separately those three conditions.

6.1. Condition 1: pi ≥ 0

Combining Equation (22) with pi ≥ 0, we get that:

ϕ ^ b · n ^ b + ϕ ^ m · ( 2 n ^ m ) 2 ( ϕ ^ b + ϕ ^ m ) 0

Remember that Equation (28), which is the denominator of Equation (29) must also be fulfilled. Thus, we need:

ϕ ^ b · n ^ b + ϕ ^ m · ( 2 n ^ m ) 0

After that, we substitute Equation (24) in Equation (30) to get the following first condition to be fulfilled by kb/m:

k b · MOS b · n ^ b J b + k m · MOS m · ( 2 n ^ m ) J m 0

Now, if we multiply the whole inequation Equation (31) by 1 k m ( k m + ) and rename k b k m by kb/m:

k b / m · MOS b · n ^ b J b + MOS m · ( 2 n ^ m ) J m 0
k b / m · MOS b · n ^ b J b MOS m · ( n ^ m 2 ) J m
k b / m MOS m · J b · ( n ^ m 2 ) MOS b · J m · n ^ b

6.2. Condition 2: pi ≤ 1

Combining Equation (22) with pi ≤ 1 leads to:

ϕ ^ b · n ^ b + ϕ ^ m · ( 2 n ^ m ) 2 · ( ϕ ^ b + ϕ ^ m ) 1

Looking at Equation (28), we can write:

ϕ ^ b · n ^ b + ϕ ^ m · ( 2 n ^ m ) 2 · ( ϕ ^ b + ϕ ^ m )

Now, we substitute Equation (24) in Equation (36) to get:

k b · MOS b · n ^ b J b + k m · MOS m · ( 2 n ^ m ) J m 2 · ( k b MOS b J b + k m · MOS m J m )

Again, we multiply the whole inequation by 1 k m ( k m + ) and rename k b k m by kb/m:

k b / m · MOS b · n ^ b J b + MOS m · ( 2 n ^ m ) J m 2 · ( k b / m · MOS b J b + MOS m J m )
and removing 2 · ( MOS m J m ) from both sides, we reach to:
k b / m · MOS b · ( n ^ b 2 ) J b MOS m · n ^ m J m

Now, before we continue we will find out which is the sign of the expression (b − 2). b was defined in Equation (20) as the relation between the number of I+P frames received from the best path (nrb) and the total number of I+P frames sent (ns).

n ^ b = n r b n s = n r b n s b + n s m 1
since nrbnsb (some I+P frames might have been lost through the best path) and min(nsm) = 0 (that minimum value is obtained when no frame was sent through the medium-quality path).

Therefore,

n ^ b 2 1

Finally, the second inequation to be fulfilled by kb/m is:

k b / m MOS m · J b · n ^ m MOS b · J m · ( n ^ b 2 )

6.3. Condition 3: Concave Function Ui

For Ui to be a concave function, Equation (28) must be fulfilled. Substituting Equation (24) in Equation (28), we get:

k b · MOS b J b + k m · MOS m J m > 0

If we multiply the whole inequation by 1 k m ( k m + ) and rename k b k m by kb/m, we get:

k b / m · MOS b J b > MOS m J m

Finally, we obtain Equation (45) as the third condition to be fulfilled by kb/m:

k b / m > MOS m · J b MOS b · J m

6.4. The Three Inequations to Be Fulfilled by kb/m

We first rewrite the three inequations to be satisfied by kb/m: Equations (34), (42) and (45). Besides, we will rename the thresholds of the three inequations as α0, α1 and α2, respectively

k b / m > MOS m · J b MOS b · J m = α 0 k b / m MOS m · J b · ( n ^ m 2 ) MOS b · J m · n ^ b = α 1 k b / m MOS m · J b · n ^ m MOS b · J m · ( n ^ b 2 ) = α 2

We need to find a value for kb/m that satisfies the three inequations. First of all, the range of solutions for kb/m is ]Kb/m, +∞), where Kb/m will be the maximum value among α0, α1 and α2. The probability p i * ( k b / m ) of sending (I+P) frames through the best path is depicted in Figure 7. The limit of p i * ( k b / m ) when kb/m (horizontal asymptote) can be obtained from Equation (26) and it has the following value:

lim k b / m p i * ( k b / m ) = n ^ b 2

The vertical asymptote occurs at kb/m-value that makes the denominator zero (i.e., kb/m = α0). We should find a value for kb/m in the range ]Kb/m, +∞) with which p i * ( k b / m ) changes softly throughout time. This way, the transition in the selection between the best and the medium-quality paths will be smooth producing a more stable system. For that, we calculate the first derivative p i * ( k b / m ) k b / m, which represents the slope value for each kb/m > Kb/m (i.e., Zone of interest).

p i * ( k b / m ) k b / m = ( n ^ b · MOS b J b ) · ( 2 · k b / m · MOS b J b + 2 · MOS m J m ) 4 · ( k b / m · MOS b J b + MOS m J m ) 2 ( 2 · MOS b J b ) · ( k b / m · MOS b · n ^ b J b + MOS m · ( 2 n ^ m ) J m ) 4 · ( k b / m · MOS b J b + MOS m J m ) 2

After simplifying the equation, we obtain:

p i * k b / m = MOS b J b · MOS m J m · ( n ^ b + n ^ m 2 ) 2 · ( k b / m · MOS b J b + MOS m J m ) 2

Now, we isolate kb/m from Equation (49) in terms of p i * ( k b / m ) k b / m and we get the following expression:

k b / m = ± MOS b J b · MOS m J m · ( n ^ b + n ^ m 2 ) 2 · p i * ( k b / m ) k b / m MOS m J m MOS b J b

Here, we can see that (b + m–2) < 0, since n ^ b = n r b n s = n r b n s b + n s m 1, and n ^ m = n r m n s = n r m n s b + n s m 1. Look at Equation (40) to see the easy justification for both expressions.

Consequently, we need that p i * k b / m 0 to compute a proper kb/m value.

The parameters of Equation (50) that can be calculated during operation time are: the number of I+P frames received from the best path (nrb) and the number of I+P frames sent through the best path (nsb) to compute n ^ b = n r b n s b; the number of I+P frames received from the medium-quality path (nrm) and the number of I+P frames sent through the medium-quality path (nsm) to compute n ^ m = n r m n s m; the jitter delay through the best and the medium-quality paths (Jb and Jm, respectively) computed from the RTCP packets; and the MOS of the best and the medium-quality paths, computed with Equation (B1) presented in the Appendix B.

The only variable in Equation (50) that is not defined yet is p i * ( k b / m ) k b / m. To design a proper value for p i * ( k b / m ) k b / m, we carried out a high amount of simulations under different network conditions and with different values of p i * ( k b / m ) k b / m and we noticed that with a value of p i * ( k b / m ) k b / m = 0.2, the variation of p i * throughout time was soft without sharp changes. From Equation (50), we see that we have two possible values for kb/m, one of them is higher than Kb/m and the other one is lower than Kb/m, so we take the one which belongs to the range ]Kb/m, +∞).

To conclude with, Algorithm 1 summarizes the methodology to compute the best response probability p i * for player i to send his/her I+P frames through the best path.


Algorithm 1 Calculation of p i *, the best response probability for player i that maximizes his/her utility function Ui.

Require: Obtain updated QoS values from the periodically received RTCP packets.
1:Obtain the values of (MOSb, MOSm, Jb, Jm, b, m)
2:Compute the kb/m parameter designed that fulfills the requirements.
k b / m = MOS b J b MOS m J m ( n ^ b + n ^ m 2 ) 2 p i * k b / m MOS m J m ± MOS b J b
3:Calculate the probability p i * to send I+P frames through the best path, that maximizes the utility function Ui
p i * ( k b / m ) = ( k b / m MOS b J b ) n ^ b + ( MOS m J m ) ( 2 n ^ m ) 2 ( k b / m MOS b J b + MOS m J m )

7. Simulation Results

In this section, we first depict a case study in a smart city about which we will set the NS2 simulation scenarios. The case study involves an emergency situation in MANETs and VANETs to transmit a multimedia warning message to the closest emergency unit and to alert other citizens around. After that, we present a performance evaluation in a MANET scenario in Subsection 7.2, and in a VANET scenario in Subsection 7.3.

7.1. A Case Study in a Smart City

We focus this research work on two realistic smart city scenarios. A mobile adhoc network (MANET) and a vehicular ad hoc network (VANET), where emergency prevention and response are key issues. In the two scenarios under consideration, we assume that in a given moment an accident happened. Most of the citizens nowadays carry mobile phones or tablets. In the MANET/VANET scenario, we assume that a smart citizen/driver witnesses the situation, makes a short video-warning message (the driver will just push a button that will make a small exterior car-mounted camera shoot the video) about the accident and sends it through the MANETAANET to the nearest emergency unit (e.g., police, ambulances, hospitals). Authorities will respond upon receiving the video and will take proper actions. This way, with a video-warning message the emergency can be evaluated much better than with a simple text. It would be easier to ensure an accurate interpretation of the situation and the accident could be treated with the adequate level of seriousness. The smart citizen/driver sends a multimedia message which includes different information regarding the incident, e.g., the GPS location, a voice message and a short video of the incident. A suitable kind of smart-911 (112 in Europe) application in the citizen's mobile/vehicle sends the multimedia message to the smart-911 emergency center, who manages the proper actions for that incident. For instance, ambulances and paramedical will be sent there, traffic lights will turn to red around the accident, a green wave of traffic lights will help the ambulances get there sooner, the nearest hospital is warned, the doctors wait for the injuries, etc. A video of the incident facilitates a preliminary evaluation of the wounded people as well as helps to better determine the requirements needed to manage the dangerous situation. Our purpose in this work is to design a game-theoretical multipath routing protocol suitable to transmit those video-warning messages over MANETs/VANETs in this kind of smart city scenarios. In the next section, a detailed performance evaluation in the MANET scenario will be studied, whereas a first brief performance evaluation in a VANET scenario is done in Section 7.3.

7.2. Performance Evaluation in a MANET Scenario

We implemented our proposal in the open source network simulator NS2 [35] where we conducted simulations to evaluate the benefits of our approach. The MANET scenario was generated with the Bonnmotion tool [36]. The same quantity of interfering CBR traffic was generated in each simulation to constrain the paths. For instance, for 2 players, we generated interfering CBR traffic at 300 Kbps, 200 Kbps for 3 players, 150 kbps for 4 players and 120 kbps for 5 players. This way, a total interference CBR raffic of 600 Kbps was sent whatever the number of players was. The simulation settings of the scenario are shown in Table 3. All the figures show confidence intervals (CI) of 90 percent obtained from 20 simulations per point, each simulation with an independent Bonnmotion scenario.

The scenario used to test the proposal consists of a set of 50 mobile nodes distributed in a MANET of 520 × 520 m2. The transmission range of the nodes is 120 m. Nodes move with a speed up to 2 m/s. Video flows are transmitted from nodes Si to nodes Di, 1 ≤ iN where N is the number of players (sources). The paths discovered by the MMDSR routing protocol are classified by each user using the MMDSR path classification described in Section 3.4. Each source decides the path to route packets according to the game-theoretical routing algorithm presented in Section 5 and depicted in Figure 5.

Figure 8 shows the average percentage of packet losses when using the game-theoretical scheme for a variable p value calculated using Algorithm 1 against the case of non using it (Non game option). We can clearly notice how including the game-theoretical routing scheme, the average video packet losses are reduced around 10% for N = 2 to 5 users. The average packet losses decreases due to the optimal selection of paths based on a probability value (i.e., p*) that optimally balances the load among the two paths at stake (i.e., the best and the medium-quality paths). Figure 9 depicts the (I+P) packet losses throughout simulation time. In this case, we see how using the game-theoretical model, losses are around 20% lower than non using it.

Figure 10 depicts the average end-to-end packet delay. We can see that the case including the Game scheme improves the delay compared to the Non Game case. This is specially notable (around half a second) for a high number of sources N = 4 or 5, since in those cases, the amount of traffic is much higher and a smart selection of the forwarding paths gains importance.

Figures 11 and 12 depict the average delay jitter suffered by packets through the best and the medium-quality path, respectively. In both cases, the jitter using the game-theoretical scheme shows a slightly better result against the Non Game case for 2 to 4 players. The improvement is notably higher for 5 sources, when the jitter is also higher due to the high traffic that produces a higher variation in the packet delays.

Figure 13 depicts the peak signal-to-noise ratio (PSNR) obtained for 2, 3, 4 and 5 players. We can see that the case including the Game scheme improves the PSNR compared to the Non Game case. Also, PSNR decreases as N increases. This is because as N increases, the number of video frames to be sent increases, causing more packet losses and as a result a lower PSNR.

7.2.1. Gain for I and P Frames

To better see separately the gain obtained for I and P frames, we define the following parameters:

% GainI i = ( ILNG i ILG i ILNG i ) · 100
% GainP i = ( PLNG i PLG i PLNG i ) · 100
where
  • i: 2, 3, 4 and 5 sources (players).

  • ILNGi: percentage of packet losses for I frames when the game-theoretical scheme is not used.

  • ILGi: percentage of packet losses for I frames when the game-theoretical scheme is used.

  • PLNGi: percentage of packet losses for P frames when the game-theoretical scheme is not used.

  • PLGi: percentage of packet losses for P frames when the game-theoretical scheme is used.

  • GainIi: Gain obtained for I frames using the game-theoretical scheme with respect to not using it.

  • GainPi: Gain obtained for P frames using the game-theoretical scheme with respect to not using it.

Figure 14 shows the average of all the simulation results for %GainPi and %GainIi. We can see that when the game-theoretical scheme is applied, the gain is 11%, 18%, 25%, 32% for I packets (dark bars) and 95%, 83%, 75%, 69% for P packets (light bars), for 2, 3, 4 and 5 players, respectively. As we can observe, %GainPi > %GainIi in all the cases. This is because there are much more P frames than I frames (see Figure 1) per player so the benefits are more noticeable for P frames. When N increases, the difference is lower, since the number of I frames increases.

In addition, we observe a slightly increment for %GainIi (dark bars) as N increases. This is because as N increases, the number of I frames increases and this makes the game-theoretical scheme benefits more noticeable. On the other hand, %GainPi decreases as N increases. The reason is that as N increases, there are too many P frames (more collisions), higher loads to be balanced and as a result we obtain a lower benefit. Nonetheless, %GainPi is still high (around 70% for 5 sources).

7.2.2. Utility Function Values

In this section, we will compute the gain of our game-theoretical routing scheme. Let us define UGi as the utility function for player i when the game-theoretical scheme is used and UNGi as the utility function when it is not used. Both utility function values will be computed using Equation (17). Gi is the gain obtained for player i by using the game-theoretical scheme with respect to not using it, 0 ≤ Gi ≤ 1.

G i = U G i U N G i U G i = U p = p i * U p = 1 U p = p i *

Using Equation (17) in Equation (53) we obtain:

G i = U G i U N G i U G i = ( n r b , i n s , i · p i * n s , i · p i * ) · ϕ b , i · ( p i * ) 2 J b , i + ( n r m , i n s , i · ( 1 p i * ) n s , i · ( 1 p i * ) ) · ϕ m , i · ( 1 p i * ) 2 J m , i ( n r b , i n s , i · 1 n s , i · 1 ) · ϕ b , i · 1 J b , i ( n r b , i n s , i · p i * n s , i · p i * ) · ϕ b , i · ( p i * ) 2 J b , i + ( n r m , i n s , i · ( 1 p i * ) n s , i · ( 1 p i * ) ) · ϕ m , i · ( 1 p i * ) 2 J m , i

7.2.3. A Numerical Example

In this section, we show a numerical example to calculate the gain obtained with our proposal for N = 2 users using Equation (54), i.e., G1 and G2. To do that, we use the values obtained during simulation from the RTCP packets. They are shown in Table 4.

We calculate the variable kb/m,1 and kb/m,2 for players 1 and 2 using Equation (50) and the simulation output values shown in Table 4. Results are shown in Table 5.

After that, we simplify ( n r b , i n s b , i n s b , i ) and ( n r m , i n s m , i n s m , i ) as seen in Equations (55) and (56) in order to be easily calculated later using Table 4.

( n r b , i n s b , i n s b , i ) = n r b , i n s , i · p i * n s , i · p i * = n ^ b , i p i * 1
( n r m , i n s m , i n s m , i ) = n r m , i n s , i · ( 1 p i * ) n s , i · ( 1 p i * ) = n ^ m , i ( 1 p i * ) 1

Next, we calculate ϕb and ϕm for each player using Equation (23) so they can be substituted in Equation (17).

ϕ b , 1 = k b , 1 · M O S b , 1 = k b / m , 1 · k m , 1 · M O S b , 1 = 3.134 · k m , 1
ϕ b , 2 = k b , 2 · M O S b , 2 = k b / m , 2 · k m , 2 · M O S b , 2 = 3.5555 · k m , 2
ϕ m , 1 = k m , 1 · M O S m , 1 = 4 · k m , 1
ϕ m , 2 = k m , 2 · M O S m , 2 = 5 · k m , 2

Finally, substituting Equations (55) to Equation (60) in Equation (54), we obtain that G1 ≈ 0.65 and G2 ≈ 0.85.

These values mean that for player 1 the gain is 65% more using the game-theoretical model instead of not using it. In the same way, for player 2 the gain is 85%. Figure 15a,b show the utility functions U1 and U2 and their maximum values obtained for p i = p i * for players 1 and 2, computed with Equation (26).

7.2.4. Behaviour of p i *

It is important to analyze the behavior of p i * when the fraction of packet losses through the best or through the medium-quality paths (FPLb or FPLm) changes. We can easily guess that if the packet losses through the best path (i.e., FPLb) increases, the probability to sent (I+P) frames through that best path p i * should decrease, so more (I+P) packets would be sent through the medium-quality path. On the other hand, if the packet losses through the medium path (i.e., FPLm) increases, p i * should increase, so more (I+P) packets would be sent through the best path.

A way to check this logical behavior is to analyze an interval of time of a simulation where jitter and losses behave almost constant in one path (best or medium-quality path) and see how jitter and losses in the other path behave. However, it was impossible to find such an interval. Due to that, we decided to prove it mathematically taking some values of our simulations as inputs. This will help us to analyze the p i * behavior when FPLb or FPLm changes, which are shown in Figures 16 and 17. As we can see, we only study the behavior of p i * as a function of the FPL till 40% of packet losses since above that threshold it is considered as a non interest range. We show the average results of three different simulations.

Figure 16 depicts the behavior of the best response probability p i * of sending I+P frames through the best path for player i when the fraction of packet losses (FPL) through the medium-quality path FPLm increases. It is important to mention that as FPLm increases, p i * increases as well. The reason is that when FPLm increases that means that we are loosing more packets in the medium-quality path, so we should better send the packets through the best path (i.e., increase p i *) in order to alleviate the congestion in the medium-quality path.

In the same way, Figure 17 depicts the behavior of the best response probability p i * of sending I+P frames through the best path for player i (i.e., p i *) when the fraction of packet losses (FPL) through the best quality path FPLb increases. We can see that when FPLb increases, p i * decreases. The reason is that when FPLb increases that means that we are loosing more packets in the best path, so we should send more packets through the medium-quality pat (i.e., decrease p i *) in order to avoid congestion in the best path.

For further information about how we obtained Figures 16 and 17, please see the Appendix B.

In the next section, we present an initial performance evaluation of our proposal in a VANET scenario to show the benefits of our approach in this kind of vehicular scenario. As pointed out in Section 8, we are currently developing a multi-user game-theoretical geographic routing protocol specifically designed to cope with the inherent issues of VANETs, and that will be based on this current work as a starting point.

7.3. Performance Evaluation in a VANET Scenario

In this subsection we introduce a brief performance evaluation of our proposal in a VANET scenario, where we proved the MMDSR protocol plus the multi-user game-theoretical approach described in Section 4. Video flows are transmitted from two vehicles to two access points AP1 and AP2 (see Figure 18), respectively. AP1 is the Ana Torres Institute (a surgery clinic) and AP2 is the Hospital Clinic of Barcelona, which represent two emergency units where vehicles will send their multimedia warning messages upon the event of a traffic accident. Each vehicle will send its multimedia warning message to the closest AP We carried out ten simulations per point using the NS2 [35]. Figure 19 shows the results with confidence intervals (CI) of 90 percent. In the simulations, we used a real city area obtained from the example district of Barcelona, Spain (see Figure 18). In order to simulate a realistic scenario, the CityMob for Roadmaps (C4R) [38] simulator was used to obtain the mobility model. C4R is a mobility generator that uses the Simulation of Urban MObility (SUMO) engine [39]. Besides, C4R imports maps directly from OpenStreetMap [40] and generates NS2 compatible files to specify the mobility model for the vehicles through the city along the whole simulation. The simulation settings of the VANET scenario are shown in Table 6.

Figure 19a shows the average percentage of packet losses for N = 2 users when using the game-theoretical scheme against the case of non using it (Non game option). We can see how including the game-theoretical routing scheme, the average video packet losses are reduced from 26% to 11%. This decrement of the average packet losses is due to the optimal selection of paths based on a probability value (i.e., p*) that optimally balances the load among the two paths at stake (i.e., the best and the medium-quality paths) depending on the quality of the paths. Figure 19b depicts the average end-to-end packet delay. We can see that the case including the Game scheme improves the delay compared to the Non Game case. It is reduced from 0.09 s to 0.04 s. Figure 19c depicts the average jitter delay suffered by the packets. Here, we observe that the jitter using the game-theoretical scheme shows slightly better result compared to the Non Game case for 2 players.

This has been a first performance evaluation of our game-theoretical routing approach applied in vehicular ad hoc networks. Results show clear benefits after including our game-theoretical approach in a multipath location-based routing protocol over VANETs. Based on these incipient results, in a next work we will further develop a multi-hop geographical routing protocol for VANETs based on a game-theoretical approach to send video warning messages in a smart city following a similar work strategy made in this paper. Our previous experience with VANET routing protocols [41,42] will be a good starting point since in our design we will consider the special inherent features of VANETs. The main difference with this current work will be the design of the game-theoretical routing algorithm based on a hop-by-hop forwarding strategy instead of on an end-to-end forwarding path strategy as we did in this present work. We foresee enhanced results for VANETs after including this modification.

8. Conclusions and Future Work

In this paper, we have designed a new rooting protocol for MANETs to send video-warning messages in a smart city. The routing protocol is based on a game-theoretical scheme for N users. Our framework could be used in smart cities where prevention of accidents is an important goal. We understand that with a video message, the level of seriousness of the accident could be much better evaluated by the authorities allowing a fast warning of the incident to emergency units, which potentially could save lives.

The users of the framework could be any dynamic sensor such as citizens with smart phones or tablets that could participate in the MANET to send the video to the competent authorities. Also, smart citizens would easily be warned by other citizens about any situation in the city, which would improve the quality of life in the smart cities.

In our framework, the probability p of sending the most important video frames (i.e., I+P frames) through the best available path varies depending on some network characteristics. This way, instead of sending the I+P video frames always through the best available path, users play a strategic routing game where these frames will be sent through one of the two best paths according to a certain probability p*.

Simulation results in the MANET scenario show the benefits of our proposal by outperforming the results compared to the case of non using our game-theoretical routing. In terms of packets losses, delay and jitter, results notably improve for N = 2, 3, 4 and 5 users, due to the new way of selecting the forwarding path based on p*. Our proposal makes the network more efficient as well as achieves a higher degree of satisfaction of the users by receiving much more (I+P) frames with a lower average end-to-end delay and jitter. This definitively will improve the quality of the video perceived by the end user. Moreover, improvements are also shown for N = 2 users in the simulation results of a VANET scenario, in terms of percentage of packet losses, average packet delay and average delay jitter.

As a future work, we are planning a further contribution with a multi-user game-theoretical forwarding algorithm included in the operation of a geographical routing protocol specially designed to distribute multimedia data over VANETs in smart cities. In this kind of scenarios, video-streaming services are taking an important attention from the interest to distribute light and short videos to allow drivers, passengers, paramedics, and first responder teams to capture, share, and watch video sequences from accidents and other emergencies that happened in the city. This way, multimedia warning messages sent upon the event of a traffic accident will allow the emergency units to make a better preliminary evaluation of the situation. Our proposal could be a solution to improve the routing operation to distribute multimedia data over VANETs in smart cities.

In addition, as a future work, the weights of the QoS metrics will be self-configured. We will design a new way to compute and update those weights so that paths/vehicles (paths in MANETs and vehicles in VANETs) would be better arranged according to their QoS metrics and the current state of the environment. In this way, each time the forwarding algorithm needs to classify paths/vehicles, a proper weight value to each metric will be updated depending on the current state of the network.

Appendix

Appendix A

In this appendix, we describe the test that we made to attain Figure 6. We followed the ITU-T recommendation P.800 (1996) [43] to make our test.

In this test, ten people (7 men and 3 women, aged 25–50) from the department of Telematics Engineering of the Universitat Politècnica de Catalunya (UPC) participated. We asked them to give their mean opinion score (MOS) value to a video received through a MANET urban scenario (see Table 3) when the fraction of packet losses (FPL) increased. The video sequence used in the tests was the “Traffic accidents” [37]. Users took into consideration that they were in a MANET scenario, were nodes move, links break often and the network topology is dynamic. The average of the results are shown in Table 2 and Figure 6.

Appendix B

To compute p i * with Equations (26) and (50) and to attain Figures 16 and 17, we designed a expression to relate the MOS with the FPL. To do that, we used all the values obtained from the video test depicted in the Appendix A, see Figure 6, and we applied a lineal regression method to derive an equation to approximate the graph shown in Figure 6.

MOS c · FPL + d
where c = −8.1081 and d = +5.2703.

To draw Figure 16, we made constant all the parameters of Equation (26) except FPLm. These constant values were taken from simulations. To evaluate the behaviour of p i * when FPLm increases, we used Equation (B1) to be substituted in Equation (26). Similarly, to draw Figure 17, we made constant all parameters of Equation (26) except FPLb. Now, to evaluate the behaviour of p i * when FPLb increases, we used Equation (B1) to be substituted in Equation (26).

Acknowledgements

This work was partly supported by the Spanish Government through projects TEC2013-47665-C4-1-R (Emergency Response In Smart Communities, EMRISCO) and TEC2010-20572-C02-02 (Continuity of Service, Security and QoS for Transportation Systems, CONSEQUENCE). Ahmad Mezher is the recipient of a FI-AGAUR grant, from the Government of Catalonia. Luis Urquiza-Aguiar is the recipient of a full scholarship from the Secretaria Nacional de Educatión Superior, Ciencia y Tecnología (SENESCYT).

Author Contributions

Ahmad Mohamad Mezher developed the proposal of the study, implemented the code in the simulator, conducted all the simulations and carried out the analysis of results. He took care of most of the writing. Mónica Aguilar Igartua guided the entire research process as well as the mathematical analysis of the proposal and made detailed corrections of the manuscript. Luis J. de la Cruz and Emilio Sanvicente Gargallo provided the basic aspects for the application of Game Theory over MANET networks and made a review of the mathematical proposal. Esteve Pallarès Segarra, Carolina Tripp Barba, Luis Urquiza Aguiar and Jordi Forné collaborated in the planning of the simulation process and assisted with the review of the simulation results. All authors participated in the discussions to develop the proposal and made a general review of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Boukerche, A. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks; Wiley-IEEE Press: Hoboken, NJ, USA, 2008. [Google Scholar]
  2. Lao, L.; Cui, J.H. Reducing multicast traffic load for cellular networks using ad hoc networks. Proceedings of the 2nd Int'1 Conference on Quality of Service in Heterogeneous WiredAVireless Networks (QShine′05), Orlando, FL, USA, 22–24 August 2005; pp. 1–10.
  3. Aguilar, M.; de la Cruz, L.J.; Carrascal, V.; Sanvicente, E. A game-theoretical multipath routing for video-streaming services over mobile Ad Hoc networks. Comput. Netw. 2011, 55, 2985–3000. [Google Scholar]
  4. Chen, L.; Heinzelman, W.B. QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks. IEEE J. Sel. Areas Commun. 2005, 23, 561–572. [Google Scholar]
  5. Quddus, G.; Khan, R.; Iqbal, R.; Ahmed, W. Finding a stable route through AODV by using route fragility coefficient as metric. Proceedings of the IEEE International Conference on Networking and Services, Slicon Valley, CA, USA, 16–18 July 2006; pp. 107–112.
  6. Al-Gabri, M.; Li, C.; Yang, Z.; Hasan, N.; Zhang, X. Improved the Energy of Ad Hoc On-Demand Distance Vector Routing Protocol. IERI Procedia 2012, 2, 355–361. [Google Scholar]
  7. Rao, M.; Singh, N. An Improved Routing Protocol (AODV nthBR) for Efficient Routing in MANETs. Adv. Comput. Netw. Inform. 2014, 2, 215–223. [Google Scholar]
  8. Pirzada, A.A.; Datta, A.; McDonald, C. Incorporating trust and reputation in the DSR protocol for dependable routing. Comput. Commun. 2006, 29, 2806–2821. [Google Scholar]
  9. Sjaugi, M.F.; Othman, M.; Rasid, M. A New Route Maintenance Strategy for Dynamic Source Routing Protocol. Proceedings of the International Conference on Information Networking, Busan, Korea, 23–25 January 2008; pp. 1–4.
  10. Shubhajeet, S.; Das, S. Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network. Inf. Sci. 2015, 295, 67–90. [Google Scholar]
  11. Perkins, C.E.; Royer, E.M. Ad-hoc On-Demand Distance Vector Routing. 2nd IEEE Workshop Mob. Comput. Syst. Appl. 1999, 25, 90–100. [Google Scholar]
  12. RFC 4728, The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. Available online: http://www.ietf.org/rfc/rfc4728.txt (accessed on 16 April 2015).
  13. Tran, A.; Raghavendra, H. Routing with congestion awareness and adaptivity in mobile ad hoc networks. Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; pp. 1988–1994.
  14. Mbarushimana, C.; Shahrabi, A. Congestion avoidance routing protocol for QoS-Aware MANETs. Proceedings of the International Wireless Communications and Mobile Computing Conference; 2008; pp. 129–134. [Google Scholar]
  15. Al-Tarazi, M. Load Balancing Using Multiple Paths in Mobile Ad Hoc networks. Ph.D. Thesis, Jordan University of Science and Technology, Irbid, Jordan, 2009. [Google Scholar]
  16. Ahn, C.; Chung, S.; Kim, T.; Kang, S. A node-disjoint multipath routing protocol based on AODV in mobile ad hoc networks. Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, 26–29 March 2012; pp. 399–405.
  17. Tashtoush, Y.; Darwish, O.; Hayajaneh, M. Fibonacci sequence based multipath load balancing apprach for mobile ad hoc Networks. Ad Hoc Netw. 2014, 16, 237–246. [Google Scholar]
  18. Mao, S.; Hou, Y. T.; Cheng, X.; Sherali, H. D.; Midkiff, S. F. Multipath routing for multiple description video in wireless ad hoc networks. Proceedings of the IEEE INFOCOM, Miami, FL, USA, 13–17 March 2005; pp. 740–750.
  19. Zhu, X.; Setton, E.; Bernd, G. Congestion-distortion optimized video transmission over ad hoc networks. Signal Process. Image Commun. 2005, 20, 773–783. [Google Scholar]
  20. Aguilar, M.; Carrascal, V. Self-configured multipath routing using path lifetime for video-streaming services over ad hoc networks. Comput. Commun. 2010, 33, 1879–1891. [Google Scholar]
  21. Boushaba, A.; Benabbou, A.; Benabbou, R.; Zahi, A.; Oumsis, M. Intelligent Multipath Optimized Link State Routing Protocol for QoS and QoE Enhancement of Video Transmission in MANETs. Netw. Syst. Lect. Notes Comput. Sci. 2014, 8593, 230–245. [Google Scholar]
  22. Lal, C.; Laxmi, V.; Gaur, M.S. Bandwidth-aware routing and admission control for efficient video streaming over MANETs. Wirel Netw. 2015, 21, 95–114. [Google Scholar]
  23. Li, Z.; Shen, H. Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2012, 11, 1287–1303. [Google Scholar]
  24. Wu, F.; Chen, T.; Zhong, S. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks. IEEE Trans. Wirel. Commun. 2013, 12, 1573–1583. [Google Scholar]
  25. Naserian, M.; Tepe, K. Dynamic Probabilistic Forwarding in Wireless Ad Hoc Networks Based on Game Theory. Proceedings of the IEEE 79th Vehicular Technology Conference (VTC Spring), Seoul, Korea, 18–21 May 2014; pp. 1–5.
  26. Coucheney, P.; Gaujal, B.; Touati, C. Self-optimizing Routing in MANETs with Multi-class Flows. Proceedings of the Personal Indoor and Mobile Radio Communications (PIMRC), Stanbul, Turkey, 26–30 September 2010; pp. 2751–2756.
  27. Liu, J.; Jiang, X.; Nishiyama, H.; Miura, R.; Kato, N.; Kadowaki, N. Optimal Forwarding Games in Mobile Ad Hoc Networks with Two-Hop f-cast Relay. IEEE J. Sel. Areas Commun. 2012, 11, 709–715. [Google Scholar]
  28. IEEE 802.11e Standard with Quality of Service Enhancenments. Available online: http://standards.ieee.org/getieee802/download/802.11e-2005.pdf (accessed on 11 February 2015).
  29. RFC 3550, RTP: A Transport Protocol for Real-Time Applications. Available online: http://www.ietf.org/rfc/rfc3550.txt (accessed on 11 February 2015).
  30. Loscri, V.; de Rango, F.; Marano, S. Performance evaluation of ondemand multipath distance vector routing protocol over two MAC layers in mobile ad hoc networks. Proceedings of the 1st International Symposium on Wireless Communication Systems, Mauritius, 20–22 September 2004; pp. 413–417.
  31. Nasarien, M.; Tepe, K. Game theoretic approach in routing protocols for wireless ad hoc networks. Elsevier Ad Hoc Netw. 2009, 7, 569–578. [Google Scholar]
  32. Nash, J.F. Non-cooperative games. Ann. Math. 1951, 54, 286–295. [Google Scholar]
  33. Dutta, P.K. Strategies and Games: Theory and Practice; MIT Press: Cambridge, MA, USA, 2001. [Google Scholar]
  34. Osborne, M.J.; Rubinstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994. [Google Scholar]
  35. The Network Simulator, ns-2. Available online: http://nsnam.isi.edu/nsnam/ (accessed on 11 February 2015).
  36. BonnMotion. A Mobility Scenario Generation and Analysis Tool. Available online: http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/BonnMotion/ (accessed on 11 February 2015).
  37. Traffic Accidents. Available online: http://www.youtube.com/watch?v=YcxxOEen48M (accessed on 11 February).
  38. Fogue, M.; Garrido, P.; Martinez, F.J.; Cano, J.C.; Calafate, C.T.; Manzoni, P. A Realistic Simulation Framework for Vehicular Networks. Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques Simutools′12, Desenzano, Italy, 19–23 March 2012; pp. 37–46.
  39. Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban Mobility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
  40. Open Street Maps. Available online: http://www.openstreetmap.org/ (accessed on 30 March 2015).
  41. Tripp-Barba, C.; Urquiza-Aguiar, L.; Igartua, M.A.; Rebollo-Monedero, D.; Mezher, A.M.; de la Cruz Llopis, L.J.; Aguilar-Calderón, J.A.; Multimetric, A. Map-Aware Routing Protocol for VANETs in Urban Areas. Sensors 2014, 14, 2199–2224. [Google Scholar]
  42. Tripp-Barba, C.; Mezher, A.M.; Igartua, M.A.; Guérin-Lassous, I.; Sarr, C. Available Bandwidth-aware Routing in Urban Vehicular Ad-Hoc Networks. Proceedings of the 76th IEEE Vehicluar Technology Conference (VTC-Fall' 12), Quebec City, QC, Canada, 3–6 September 2012; pp. 1–5.
  43. ITU-T Recommendation P.800 (1996). Available online: http://www.itu.int/rec/T-REC-P.800-199608-I/en (accessed on 11 February 2015).
Figure 1. MPEG-2 GoP structure.
Figure 1. MPEG-2 GoP structure.
Sensors 15 09039f1 1024
Figure 2. Multipath routing scheme using three paths.
Figure 2. Multipath routing scheme using three paths.
Sensors 15 09039f2 1024
Figure 3. PM and PMR packets.
Figure 3. PM and PMR packets.
Sensors 15 09039f3 1024
Figure 4. Proposed framework to send the video frames.
Figure 4. Proposed framework to send the video frames.
Sensors 15 09039f4 1024
Figure 5. Three possible allocation situations after playing the game. F and M represent the number of (I+P) and B frames to be sent, respectively. All the B frames are always sent through the worst path. (a) All the I+P frames are sent through the best path; (b) All the I+P frames are sent through the medium-quality path; (c) I+P frames will be sent through the best path with a certain probability p and through the second best path with a probability 1-p. F1 and F2 represent the number of (I+P) frames sent through the best path and the medium-quality path, respectively, being F = F1 + F2.
Figure 5. Three possible allocation situations after playing the game. F and M represent the number of (I+P) and B frames to be sent, respectively. All the B frames are always sent through the worst path. (a) All the I+P frames are sent through the best path; (b) All the I+P frames are sent through the medium-quality path; (c) I+P frames will be sent through the best path with a certain probability p and through the second best path with a probability 1-p. F1 and F2 represent the number of (I+P) frames sent through the best path and the medium-quality path, respectively, being F = F1 + F2.
Sensors 15 09039f5 1024
Figure 6. Subjective video quality measured by means of the mean opinion score (MOS) as a function of the fraction of packet losses (FPL).
Figure 6. Subjective video quality measured by means of the mean opinion score (MOS) as a function of the fraction of packet losses (FPL).
Sensors 15 09039f6 1024
Figure 7. Best response probability p i * as a function of kb/m, see Equation (26).
Figure 7. Best response probability p i * as a function of kb/m, see Equation (26).
Sensors 15 09039f7 1024
Figure 8. Average percentage of packet losses.
Figure 8. Average percentage of packet losses.
Sensors 15 09039f8 1024
Figure 9. Percentage of packet losses vs time (N = 3 users).
Figure 9. Percentage of packet losses vs time (N = 3 users).
Sensors 15 09039f9 1024
Figure 10. Average end-to-end packet delay.
Figure 10. Average end-to-end packet delay.
Sensors 15 09039f10 1024
Figure 11. Delay jitter through the best path.
Figure 11. Delay jitter through the best path.
Sensors 15 09039f11 1024
Figure 12. Delay jitter through the medium-quality path.
Figure 12. Delay jitter through the medium-quality path.
Sensors 15 09039f12 1024
Figure 13. Peak Signal to Noise Ratio (PSNR).
Figure 13. Peak Signal to Noise Ratio (PSNR).
Sensors 15 09039f13 1024
Figure 14. Gain in terms of packet losses for I and P video frames using the game-theoretical scheme with respect to not using it.
Figure 14. Gain in terms of packet losses for I and P video frames using the game-theoretical scheme with respect to not using it.
Sensors 15 09039f14 1024
Figure 15. Utility function graph for player 1 and 2. (a) Player 1; (b) Player 2.
Figure 15. Utility function graph for player 1 and 2. (a) Player 1; (b) Player 2.
Sensors 15 09039f15 1024
Figure 16. Behaviour of p i * as the fraction of packet losses (FPL) through the medium-quality path (FPLm) increases. Here the FPL through the best path remains constant.
Figure 16. Behaviour of p i * as the fraction of packet losses (FPL) through the medium-quality path (FPLm) increases. Here the FPL through the best path remains constant.
Sensors 15 09039f16 1024
Figure 17. Behaviour of p i * as the fraction of packet losses (FPL) through the best path (FPLb) increases. Here the FPL through the medium-quality path remains constant.
Figure 17. Behaviour of p i * as the fraction of packet losses (FPL) through the best path (FPLb) increases. Here the FPL through the medium-quality path remains constant.
Sensors 15 09039f17 1024
Figure 18. Simulation scenario of Barcelona, Spain (N = 2 users). It includes two emergency units: AP1 (Ana Torres surgery clinic) and AP2 (Hospital Clinic of Barcelona).
Figure 18. Simulation scenario of Barcelona, Spain (N = 2 users). It includes two emergency units: AP1 (Ana Torres surgery clinic) and AP2 (Hospital Clinic of Barcelona).
Sensors 15 09039f18 1024
Figure 19. Simulation results for N = 2 users. (a) Average percentage of packet losses; (b) Average end-to-end packet delay; (c) Average delay jitter.
Figure 19. Simulation results for N = 2 users. (a) Average percentage of packet losses; (b) Average end-to-end packet delay; (c) Average delay jitter.
Sensors 15 09039f19 1024
Table 1. Definitions of the variables presented in Equation (14).
Table 1. Definitions of the variables presented in Equation (14).
VariableDefinition
i = 1, 2, 3…, Nis a generic player, being N the number of players
piPlayer's i probability of sending the (I+P) frames through his/her best path
ϕb,iPlayer's i benefit for the best path
ϕm,iplayer's i benefit for the medium-quality path
nsb,iNumber of (I+P) frames sent by player i through the best path
nrb,iNumber of (I+P) frames received from player i through the best path
nsm,iNumber of (I+P) frames sent by player i through the medium-quality path
nrm,iNumber of (I+P) frames received from player i through the medium-quality path
Jb,iDelay jitter of player i through the best path
Jm,iDelay jitter of player i through the medium-quality path
Table 2. Mapping of mean opinion scores (MOS) and fraction of packet losses (FPL) for (I+P) frames in a general MANET scenario.
Table 2. Mapping of mean opinion scores (MOS) and fraction of packet losses (FPL) for (I+P) frames in a general MANET scenario.
MOSFPL
5-ExcellentFPL<20%
4-Good20% ≤ FPL < 30%
3-Fair30% ≤ FPL < 40%
2-Poor40% ≤ FPL < 50%
1-BadFPL ≥ 50%
Table 3. Simulation settings of the MANET scenario.
Table 3. Simulation settings of the MANET scenario.
Area520 × 520 m2
Number of nodes50
Average node speed2 m/s
Transmission range120 m
Mobility PatternRandom Waypoint
MAC specificationIEEE 802. 11e,EDCF
CWi,min, i ∈ (0,1,2,3)(7,15,31,63)
CWi,max, i ∈ (0,1,2,3)(15, 31,1023,1023)
AIFSi, i ∈ (0,1,2,3)(34 μs, 43 μs, 52 μs, 61 μs)
(BWmin, Lmax, Dmax, Jmax)(50 Kbps, 35 %, 0.125 s, 0.004 s)
Nominal bandwidth11Mbps
Simulation time1000 s
Video encodingMPEG-2 VBR
Video bit rate150 Kbps
Video sources2 to 5
Video sequence sentTraffic accidents [37]
Routing protocolGame-theoretical algorithm + MMDSR
Transport protocolRTP/RTCP/UDP
Maximum packet size1500 Bytes
Multipath schemeK=3 paths
Weighting values (Equation (3))1/7
Queue sizes50 packets
Interfering CBR traffic(300, 200, 150 and 120) Kbps
Channel noise−92 dBm
Mobility pattern generatorBonnmotion
Table 4. Simulation output values for N = 2 users.
Table 4. Simulation output values for N = 2 users.
Jb,1, Jb,2(0.021067 s, 0.008867 s)
Jm,1,Jm,2(0.011379 s, 0.010136 s)
b,1,b,2(0.6, 0.45)
m,1,m,2(0.2, 0.4)
MOSb,1, MOSb,2(5,5)
MOSm,1,MOSm,2(4,5)
Table 5. Best response probabilities p i * for N = 2 users.
Table 5. Best response probabilities p i * for N = 2 users.
kb/m,1, kb/m,2(0.6268,0.7111)
p 2 *, (0.72, 0.54)
Table 6. Simulation settings of the VANET scenario.
Table 6. Simulation settings of the VANET scenario.
Map ZoneExample District of Barcelona
Area850 × 580 m2
Number of nodes50
Transmission range120 m
Mobility generatorSUMO [39]/C4R [38]
MAC specificationIEEE 802.11p
Nominal bandwidth11 Mbps
Simulation time250 s
Video encodingMPEG-2 VBR
Video bit rate150 Kbps
Video sources2
Video sequence sentTraffic accidents [37]
Routing protocolGame-theoretical algorithm + MMDSR
Transport protocolRTP/RTCP/UDP
Maximum packet size1500 Bytes
Multipath schemeK = 3 paths
Weighting values (Equation (3))1/7
Queue sizes50 packets
Interfering CBR traffic100 Kbps

Share and Cite

MDPI and ACS Style

Mezher, A.M.; Igartua, M.A.; De la Cruz Llopis, L.J.; Segarra, E.P.; Tripp-Barba, C.; Urquiza-Aguiar, L.; Forné, J.; Gargallo, E.S. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks. Sensors 2015, 15, 9039-9077. https://doi.org/10.3390/s150409039

AMA Style

Mezher AM, Igartua MA, De la Cruz Llopis LJ, Segarra EP, Tripp-Barba C, Urquiza-Aguiar L, Forné J, Gargallo ES. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks. Sensors. 2015; 15(4):9039-9077. https://doi.org/10.3390/s150409039

Chicago/Turabian Style

Mezher, Ahmad Mohamad, Mónica Aguilar Igartua, Luis J. De la Cruz Llopis, Esteve Pallarès Segarra, Carolina Tripp-Barba, Luis Urquiza-Aguiar, Jordi Forné, and Emilio Sanvicente Gargallo. 2015. "A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks" Sensors 15, no. 4: 9039-9077. https://doi.org/10.3390/s150409039

Article Metrics

Back to TopTop