Skip to main content
Erschienen in: Quantum Information Processing 6/2017

Open Access 01.06.2017

Quantum load balancing in ad hoc networks

verfasst von: M. Hasanpour, S. Shariat, P. Barnaghi, S. A. Hoseinitabatabaei, S. Vahid, R. Tafazolli

Erschienen in: Quantum Information Processing | Ausgabe 6/2017

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

1 Introduction

Game theory is the theory of strategies. With the aid of this method, players of the game are suggested a strategy that maximizes their total payoff. Quantum game theory provides a framework to utilize entangled particles with the aim of affecting decision-making process of distant players without transmission of any information. In a quantum game, players can use properties of entangled particles to have an instantaneous influence on the strategies of other players to increase their pre-defined utility function [24].
In a quantum game, players can use properties of entangled particles to have an instantaneous influence on the strategies of other players to increase their pre-defined utility function. This is enabled by the properties of entangled particles which creates a communication-less instantaneous channel which can be used to influence the strategies made by the players in a quantum game. A system is known to be quantum when the physical states of that system are in violation of the Bell inequalities [5]. One of the properties of a quantum system is the larger accessible space of states which can be utilized to maximize a pre-defined classic utility function.
Load balancing has been the focus of many types of research involving ad hoc networks. As load balancing is a network-wide optimization and improvement mechanism, the solutions involving this area has mainly been implemented in the network layer of the OSI (Open Systems Interconnection) model. Routing protocols, as network layer agents, are responsible for computation of the network connectivity graph (taking into account the cost/benefit metrics) which would make them the most suitable candidates to accommodate load balancing strategies. By taking load balancing strategies in the routes requested by the nodes in the network, a minimum acceptable QoS can be guaranteed in the entire network. In ad hoc networks, routing protocols operate in a distributed manner within each node without any direct interactions among them. Given that design of routing protocols is based on a distributed paradigm, load balancing algorithms have to operate under the same network assumptions. As a result of this, achievement of an overall network gain would be extremely challenging.
The focus of this paper is to target load balancing in ad hoc networks by utilization of entangled particles in a quantum game setup. By formulation of the problem of load balancing in ad hoc networks under the umbrella of quantum game theory, it is shown that considerable gain can be achieved in traffic management and load balancing. We have proven that the quantum game strategies can be designed to maximize fair distribution of network load, and the sender nodes can utilize the full potential of these strategies to perform fair load distribution. Quantum strategies and entangled particles are also in the core of quantum networks and communication [68]. Quantum networks introduce more efficient and secure long-distance information transmission in comparison with their classical counterparts. Another very important area that quantum game theory can have a significant impact is cloud-based data encryption [1, 911]. Quantum game theory has the potential to create very robust and reliable encryption mechanisms.
The remainder of this paper is organized as follows. Section 2 discusses the challenges regarding load balancing in ad hoc networks. Next, Sect. 3 summarizes the existing load-balanced routing protocols in the literature. Section 4 focuses on a general discussion on quantum game theory and also formulates a quantum game to target load balancing in ad hoc networks. In Sect. 5, the problem of load balancing in ad hoc networks is defined from a networking point of view. In Sect. 6, the performance of the proposed QLB-OLSR algorithm is compared to the baseline, and the results are discussed in detail. Finally, Sect. 7 concludes the contribution of this paper and the future direction in the area of quantum load balancing.

2 Challenges involved in load balancing of ad hoc networks

Wireless ad hoc networks are a category of decentralized infrastructure-less networks that operate based on a self-organizing paradigm. When a group of nodes, equipped with wireless interfaces dynamically connect with one another in an infrastructure-less manner, an ad hoc network is formed. Ad hoc networks do not rely on a fixed infrastructure, which makes them ideal for many applications such as emergency services and tactical/military operations. In wireless ad hoc networks, nodes communicate using wireless interfaces via the communication medium (using spectrum/channels). One of the well-known communication standards that support infrastructure-less mode of operation is IEEE 802.11. Due to the nature of wireless communication and limitations of currently deployed MAC (medium access control) protocols [12, 13], the challenges involved with ad hoc networks are significantly more than infrastructure-based wireless networks. Due to lack of infrastructure in ad hoc networks, nodes within the network are responsible for forwarding data packets from source to destinations via other ad hoc nodes. The process of delivering data packets from source to destination via other intermediate nodes is so-called routing. Routing is known to be one of the main challenges in ad hoc networks. The reason is while discovered routes in ad hoc networks need to maintain certain QoS (quality of service) criteria by efficient utilization of network resources, they are not allowed to exhaust network resources in this process. There are various limitations associated with ad hoc networks which due to their connection with the topic of this paper we have listed and analyzed them here.

2.1 Excessive noise and interference

Interference and noise are two main factors affecting the quality of routes created in ad hoc networks; this results in lower data rate mainly in the ad hoc networks that utilize IEEE 802.11 DCF (distributed coordination function) as the communication protocol for their wireless interface. IEEE 802.11 is one of the well-known protocols which has been studied extensively in various researches involving multi-hop ad hoc networks. IEEE 802.11 assumes that each channel can only be accessed by one node, and if two or more nodes try to access the channel at the same time, the collision takes place. The sensing mechanism designed in IEEE 802.11 to avoid collision is CSMA/CA (carrier sense multiple access with collision avoidance) [14]. In CSMA/CA when a collision takes place, the colliding nodes back-off from their transmission based on a random time and re-attempt their transmission after a specified time. The primary source of low data rate and capacity in ad hoc networks using IEEE 802.11 is this structure of CSMA/CA. Each collision results in a subsequent back-off delay resulting higher end-to-end delay and lower throughput in the network. The dynamic structure of ad hoc networks utilizing this technology leads excessive collision. We have used IEEE 802.11 for all the simulation studies and analysis in this research.

2.2 Dynamic topology

Another problem of ad hoc networks is their dynamic structure. MANETs (mobile ad hoc networks) are a type of ad hoc networks with support for mobility. Mobility results in excessive topology changes which cause an excessive unpredictable collision and is considered as another performance barrier. Since the focus of this work is to proof a fundamentally novel concept in networks, to reduce the problem complexity our assumption is that nodes are static.

2.3 Load balancing

Another factor that affects the performance of ad hoc networks is the lack of any load balancing mechanism. The decentralized structure of ad hoc networks makes load balancing a complicated problem. Most of the routing protocols designed for ad hoc networks do not take load balancing into account which results in uneven and unstable QoS performance across the network. Conventionally, routing protocols designed for ad hoc networks utilize a cost/quality metric to assess the performance of routes in the network. Most of the ad hoc routing protocols such as Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing Protocol (OLSR), Destination-Sequenced Distance-Vector Routing (DSDV) and Dynamic Source Routing Protocol (DSR) use hop count as the quality metric [15]. Hop count has shown many shortcomings in the past studies which are the reason why shortest paths (resulted from the minimization of hop count) in ad hoc networks would not necessarily guarantee routes with the best quality (QoS) [16]. One of the major problems with hop count or many other metrics listed in [16] is that they encourage overutilization of a single route without considering congestion and buffer overflow problems; this results in some segments of the network being heavily loaded which creates bottlenecks, and as a result, the overall QoS performance of the network is affected. Unbalanced load distribution results in congestion of heavily loaded nodes, buffer overflow and finally increased end-to-end delay in the network [17]. Overly utilized paths cause exhaustion of network resources such as power, bandwidth and memory. Hence, load balancing is one of the major issues in ad hoc networks which is the focus of this paper. Load balancing is further expanded in the next section.

3 Background study, load balancing in ad hoc networks

Over the past, load balancing has been the focus of many researches involving ad hoc networks. As load balancing is a network-wide optimization and improvement mechanism, the solutions involving this area has mainly been implemented in the network layer of the OSI (Open Systems Interconnection) model. Given that network layer is responsible for managing the network-wide connectivity information, it is ideal for implementation of any load balancing algorithm. Routing protocols, as network layer agents, are responsible for computation of the network connectivity graph (taking into account the cost/benefit metrics) which would make them the most suitable candidates to hold the load balancing strategies. By taking load balancing strategies in the routes requested by the nodes in the network, a minimum acceptable QoS can be guaranteed in the entire network. In ad hoc networks, routing protocols operate in a distributed manner within each node without any direct interactions among them. Given that design of routing protocols are based on a distributed paradigm, load balancing algorithms have to operate under the same network assumptions. As a result, achievement of an overall network gain would be extremely challenging. The work of [17] has categorized routing protocols into the three categories of delay based, traffic based and hybrid based regarding their load balancing approaches. In the delay-based protocols, minimization of link delay has been identified to have a direct impact on the network-wide load balancing. The work of [18] proposes a new routing algorithm based on AODV (Ad hoc On-demand Distant Vector) so-called Load-Aware On-Demand Routing (LAOR); this work claims that by identifying small delay routes we can achieve balanced load conditions in the network; however, this work has not provided any results supporting the argument that the realized gains in end-to-end delay and packet delivery ratio are the result of this balanced load condition or vice versa. The works proposed in [1921] use the traffic-based load balancing to achieve even load distribution in the network. As load is mainly generated by the application layer traffic, load balancing can be well achieved by distribution of traffic in the network. The work of [19] highlights that other traffic-aware load balancing algorithms use buffer size at each node to estimate the traffic load passing through that node. However, because packets buffered at each node can have different sizes, the buffer size alone cannot be used as a good estimator of load. On the other hand, as packets buffered at each node would possibly have different destinations, by analyzing the buffer as a whole a conclusive evaluation on the level of load cannot be achieved on that particular node. Hence, the author argues that it is more efficient to use the actual packet sizes in the queue and their generation rates to estimate the imposed load in the network. The work presented in [21], proposes a new on-demand routing algorithm so-called Load-Balanced Ad hoc Routing (LBAR) which attempts to achieve load balancing by circumventing congested segments of the network. It is shown that the proposed algorithm achieves higher packet delivery ratio (PDR) when compared to AODV and DSR. According to the study performed by [17], hybrid-based routing protocols perform load balancing by a combination of delay-based and traffic- based techniques. Content Sensitive Load-Aware Routing (CSLAR) [22] is one example of hybrid-based routing protocols. The work presented in [23] introduces a new routing protocol so- called Dynamic Load-Aware Routing (DLAR). DLAR is a reactive routing protocol that uses the buffer size of intermediate nodes as a performance metric for route discovery and computation phase. The main aim of DLAR is to choose routes with minimum cumulative buffer size. It is shown that DLAR achieves better PDR and end-to-end delay compared to the baseline protocol DSR. Another work in this area is Load-Aware Routing (LWR) [24] in which the author makes the argument that sometimes a detour of routes over the idle nodes can have significant positive impact on the performance of routing in ad hoc networks. The main idea behind LWR is that the heavily loaded nodes should opt-out of taking part in routing of data in the network by dropping route requests. In this way, the heavily loaded segments of the network go through a relaxation process which should gradually balance the load distribution in the network.
Stability routing is a category used in wireless sensor networks which has received interest in the past few years. The work of [25] proposes a reliability-based routing targeting underwater sensor networks; in this work, delay is considered to be of less importance than reliability of information delivery in the aforementioned networks. Location-Aware Routing Protocol (LARP) outperforms the existing routing protocols in terms of packet delivery ratio normalized routing overhead. This is achieved by utilizing the location information of nodes and a range finding technique. Another stability-based routing protocol is proposed in the work of [26] to target wireless sensor networks so-called ADCMCST. In this work, an approximation algorithm is used to minimize the child nodes in the discovered topology tree. It is shown that ADCMCST results reduced topology formation time, promising approximated results and an overall stable wireless sensor network.
One of the approaches to achieve load balancing in ad hoc networks is by multi-path routing protocols. Multi-path routing protocols store multiple alternative paths for every source–destination pairs. The main idea is that utilization of the alternative routes can result distribution of network load. While the creation of multiple routing paths between any source–destination pair in the network has been proven to be beneficial in the context of wired networks, this scheme has been under debate for wireless networks. The analytical model presented in the work of [27] argues that, unless the alternative paths provided by multipath routing consists of a very large set, the gain achieved by load distribution is almost the same as single path shortest hop routing. As ad hoc networks are not particularly designed for large dense networks, having a large set of alternative paths is an infeasible assumption, and the conclusion is that multipath routing in a realistic ad hoc scenario would not result in effective load distribution.
LB-AODV implements a load-balanced version of AODV routing protocol [28]. Load balancing is performed by a distributed grouping mechanism which performs a logical division of mobile nodes into distinct groups. It is claimed that the grouping mechanism reduces the number of unnecessary retransmissions of routing messages, and by the distribution of source nodes among the groups, the relaying of packets is limited to each source node within its group. The grouping idea used in LB-AODV is based on the Zone Routing Protocol (ZRP) presented in [29].
Another approach in load balancing is to target the problem geometrically. The work presented in [30] uses a geometrical model to perform load balancing in the network. More specifically, it considers a particular case where nodes are located in a narrow strip with the width of at most 86% of communication range.
Another location-based load-balanced routing protocol is presented in [31], which is so-called \(\hbox {LB}^{2}\hbox {R}\). It uses a dual GH (grid header) routing scheme which balances the routing load among two GHs. It is claimed that this method improves queueing delay and congestion on heavily loaded nodes. However, the results do not show an improvement regarding load balancing.

4 Quantum game theory

Quantum game theory focuses on the design of games that maximizes players’ utility enabled by the properties of entangled particles. This section concentrates on the entanglement of particles and the two scenarios where nodes in ad hoc networks can benefit from the properties of such quantum games. We explain quantum game theory, and after that, we discuss a quantum game that can be used for load balancing in ad hoc networks.

4.1 Rotation and quantum strategies

The focus of this section is to clarify the method by which quantum game theory benefits from quantum operators to suggest best strategies to players. It is worth noting that the main difference between classical game theory and quantum is that in quantum game theory, players can use entangled particles. Due to this unique difference, an explanation about entangled states and quantum operators is necessary to understand this section.
In general, entangled states are created when an additive physical property of two particles, e.g., their spin, is measured. The main characteristic of entangled particles is that measuring the physical property of one of the particles results in the other one to be reduced to a certain state. For instance, consider an entangled state comprised of two \(\frac{1}{2}\)-spin particles. Having knowledge about the spin of one particle is equivalent to knowledge of the other. This reduction to a certain state happens instantaneously regardless of the spatial distance between the two particles. It is worth noting that this process is not considered as a signaling mechanism. In other words, no information is transmitted between the two particles. This is addressed in quantum mechanics as non-locality whose existence was proven by Bell in 1964 [32].
To illustrate different parts of our theory, we limit ourselves to particles with spin of \(\frac{1}{2}\). Our formulation can be easily generalized to the higher spin particles. This generalization is discussed in Sect. 4.3.2 for particles with spin 1. So, we consider specific entangled state of \(\frac{\left| {\uparrow \uparrow } {\rangle }\right. +\left| {\downarrow \downarrow } {\rangle }\right. }{\sqrt{2}}\), which represents two entangled electrons with spins \(\frac{1}{2}\). This particular case is the subject of interest for all of this section. Our game is comprised of two players. Suppose that one of these particles is available to player 1 and the other one is available to the other player. Each player can rotate their electron (as their particle) individually and independently.
Rotation operators in three dimensions can be parameterized by three angles denoted by \(\theta , \varphi \) and \(\alpha \). For \(\frac{1}{2}\)-spin particles, the rotation operators have a \(2\times 2\) matrix representation. So, we may represent a rotation operator by \(U\left( {\theta , \varphi , \alpha } \right) \) with specific matrix shown in (1) to perform this rotation.
$$\begin{aligned} U\equiv R_\alpha \left( {\hat{n}} \right) =\left( \begin{array}{ll} {\cos \left( {\frac{\alpha }{2}} \right) -i\, n_z \sin \left( {\frac{\alpha }{2}} \right) } &{} {\left( {-i\, n_x -n_y } \right) \sin \left( {\frac{\alpha }{2}} \right) } \\ {\left( {-i\, n_x +n_y } \right) \sin \left( {\frac{\alpha }{2}} \right) }&{} {\cos \left( {\frac{\alpha }{2}} \right) +i\, n_z \sin \left( {\frac{\alpha }{2}} \right) } \\ \end{array}\right) \end{aligned}$$
(1)
where in this matrix \(n_i\) are the components of unit vector \({\hat{n}}\) with polar coordinates of \(\theta \) and \(\varphi \). In fact, this is a rotation characterized by \(\alpha \) around \({\hat{n}}\) vector, which has components shown in
$$\begin{aligned} n_x= & {} \sin \left( \theta \right) \cos \left( \varphi \right) ,\nonumber \\ n_y= & {} \sin \left( \theta \right) \sin \left( \varphi \right) ,\nonumber \\ n_z= & {} \cos \left( \theta \right) \end{aligned}$$
(2)
Spinor \(\left| \uparrow {\rangle }\right. (\left| {\downarrow {\rangle })} \right. \) has a matrix representation as \(\left( {{\begin{array}{l} 1 \\ 0 \\ \end{array} }} \right) \quad \left( {\left( {{\begin{array}{l} 0 \\ 1 \\ \end{array} }} \right) } \right) \) and rotating it by an operator can be calculated according to (3).
$$\begin{aligned} U\left| \uparrow {\rangle }\right. =R_\alpha \left( {{\hat{n}}} \right) \left( {{\begin{array}{l} 1 \\ 0 \\ \end{array} }} \right) =\left( \begin{array}{ll} {\cos \left( {\frac{\alpha }{2}} \right) -i\, \cos \left( \theta \right) \sin \left( {\frac{\alpha }{2}} \right) } \\ {-i\sin \left( \theta \right) e^{i\varphi }\sin \left( {\frac{\alpha }{2}} \right) } \\ \end{array}\right) \end{aligned}$$
(3)
The result is:
$$\begin{aligned} U\left| \uparrow {\rangle }\right. =\left( {\cos \left( {\frac{\alpha }{2}} \right) -i\cos \left( \theta \right) \sin \left( {\frac{\alpha }{2}} \right) } \right) \left| \uparrow {\rangle }\right. +\left( {-i\sin \left( \theta \right) e^{i\varphi }\sin \left( {\frac{\alpha }{2}} \right) } \right) \left| \downarrow {\rangle }\right. \end{aligned}$$
(4)
The same process can similarly be applied to \(\left| \downarrow {\rangle }\right. \). The absolute value of the coefficients powered by 2 determines the probability of obtaining each state after measuring the spin. Without loss of generality, the rotations around y-axis can be considered with utilizing, \(\theta =\frac{\pi }{2}\) and \(\varphi =\frac{\pi }{2}\).
Suppose that \(U_1 \left( {\frac{\pi }{2}, \frac{\pi }{2},\alpha _1 } \right) \) and \(U_2 \left( {\frac{\pi }{2}, \frac{\pi }{2},\alpha _2 } \right) \) are the rotation operators used by players 1 and 2, respectively. The result of this rotation is shown in (5).
$$\begin{aligned} U_1 U_2 \left( {\frac{\left| {\uparrow \uparrow } {\rangle }\right. +\left| {\downarrow \downarrow } {\rangle }\right. }{\sqrt{2}}} \right)= & {} \frac{1}{\sqrt{2}}\left( \cos \left( {\frac{\alpha _1 +\alpha _2 }{2}} \right) \left| {\uparrow \uparrow }{\rangle } \right. \right. \nonumber \\&\left. -i\sin \left( {\frac{\alpha _1 +\alpha _2 }{2}} \right) \left| {\uparrow \downarrow {\rangle } -i} \right. \sin \left( {\frac{\alpha _1 +\,\alpha _2 }{2}} \right) \left| \downarrow \uparrow {\rangle }\right. \right. \nonumber \\&\left. \left. +\cos \left( {\frac{\alpha _1 +\alpha _2 }{2}} \right) \left| {\downarrow \downarrow } {\rangle }\right. \right. \right) \end{aligned}$$
(5)
So it can be concluded that (6) represents the probability of obtaining \(\left| {\uparrow \uparrow } {\rangle }\right. \), after measuring the spin of both particles.
$$\begin{aligned} \frac{1}{2}\left| {\cos \left( {\frac{\alpha _1 +\alpha _2 }{2}} \right) } \right| ^{2} \end{aligned}$$
(6)
The formulation developed above can be generalized for higher spin particles. Higher spins can be used for games with more available strategies. The formulation above is used in Sects. 4.3.1 and  4.3.2, for two fundamental network topologies to model the best quantum advices for players of the game.

4.2 Quantum advice and entangled opinions

In this section, we explain how quantum mechanics can be utilized to obtain advices which leads to improvement in network flow management. To do this, we define a game whose players are sender nodes in the network. If the sender nodes in the network choose a strategy that optimizes load balancing via the intermediate nodes either by providing more opportunistic intermediate nodes for other nodes in low traffic situation or balancing high traffic load on intermediate nodes, they win the game. As it was demonstrated in the previous section, quantum entanglement provides a tool which increases the win probability of players in comparison with classic scenarios.
It must be noted that the calculations involving quantum games depend on the network topology. However, there are techniques which can expand this idea to larger network topologies, but the concentration of this chapter is to proof the fundamental concept behind this novel idea. Hence, two simplified topologies of doublet and triplet are investigated. The reason for choosing such topologies is to firstly proof the concept of load balancing using quantum game theory and secondly the potential of these topologies to be generalized to more complex cases. The basic idea behind our theory is that entangled particles can be used for entangling opinions of two distant players (aka sender nodes). Hence, utilize this correlation to impact the decision of one player which leads to a reduced number of allowed choices in the other player of the game. With a lower number of available options, the other player will be forced to play toward satisfying the utility function represented in this work and achieve load balancing.
The formulation presented in the previous section can be used in a realistic network traffic management game to provide advice to the players to increase their win probability. In the Sects. 4.3.1 and  4.3.2, we will illustrate design of a traffic management game based on the proposed game theory and the calculations provided.

4.3 Quantum load balancing game design

4.3.1 Doublet topology

Doublet topology is defined as a case where two relay nodes are shared among two distant senders to forward the data to two destination nodes. Since each sender node has two available next hop to route their data, we have utilized a 2-state particle entanglement scenario. Therefore, \(\frac{1}{2}\)-spin particles are used throughout this section.
Initially, we need to develop our quantum game based on the doublet topology. At the starting point, let us consider two entangled particles with spin \(\frac{1}{2}\) have been produced. The state of the particles can be represented as \(\left( {\frac{\left| {\uparrow \uparrow } {\rangle }\right. +\left| {\downarrow \downarrow } {\rangle }\right. }{\sqrt{2}}} \right) \). This state is known as one of the Bell’s states (for a discussion on these states, see [33]) and considered as maximally entangled state [34]. In simple words, this means that highly entangled particles are considered, but this problem can only be solved by considering other entangled states. Let us assume that the first particle is given to player 1 and the second one to player 2.
Now, we need to discuss how players could influence each other’s decisions by using entangled particles and the rotational operators. Every player can independently rotate its particle. Players 1 and 2 use the rotation operator \(U_1 \left( {\alpha _1 } \right) \) and \(U_2 \left( {\alpha _2 } \right) \) for rotating the particles allocated to them. Therefore, the expression for entangled state after players rotate their particles is based on (7).
$$\begin{aligned} \left| \psi {\rangle }\right. =U_1 U_2 \left( {\frac{\left| {\uparrow \uparrow } {\rangle }\right. +\left| {\downarrow \downarrow }{\rangle } \right. }{\sqrt{2}}} \right) \end{aligned}$$
(7)
The topology configuration of the doublet case is shown in Fig. 1. We will first go through the game aspect of this topology and then cover the quantum counterpart which is applicable to this network configuration.
As shown in Fig. 1, let us consider node A and B as sender nodes and nodes G and H as a destination. This simple topology is setup so that nodes A and B have no direct access to the destination nodes G and H and any data transmission has to be relayed over the intermediate nodes C and D. In other words, A and B have two different routing paths to reach nodes G and H. We denote the links that connects any sender node to node C as \(+1\) and the links that connects any of the sender nodes to node D as \(-1\). Suppose that there are two categories of data transmissions, i.e., high bit rate (HBR) and low bit rate (LBR). We characterize the data emerging each node to have a probability of P; without loss of generality, one can suppose that \(P\ge 0.5\).
To complete the traffic game, we have to define a winning case for the players in the game. Toward this aim, a general network configuration should be taken into consideration. By taking actual concepts from traffic management in the topic of networks, we can come up with a winning scenario in our game. HBR data need considerably more channel capacity for a longer duration compared to LBR. As an LBR data transmission does not require high channel capacity, it can be considered as an opportunity to other HBR flows. On the other hand, from the energy consumption point of view, an LBR flow can be engineered to result in less relay node involvement to forward the data which leads to lower energy consumption. Every intermediate node consumes energy when forwarding data, and so to obtain more efficiency, we try to minimize their utilization under an LBR traffic. Additionally, an efficient use of intermediate nodes creates more transmission opportunities for the other nodes in the network.
Having the above factual information in mind, the rule of the game can be defined as follows. If at least one of sender nodes requires sending HBR data, it is more efficient to distribute the traffic evenly across the relay nodes to efficiently support the high demands of the HBR traffic. In contrast, to save energy and provide more relaying opportunities to other nodes in the network, it is best for the LBR traffic to be forwarded via the same relay nodes. Therefore, in the former case players win the game if they choose the opposite relays (which leads to different routing paths) and in the other case, they win by selecting the same relays to forward their data. To enable such game scenario, we will next explain how entanglement is capable of increasing the probability winning this game.
In the classical viewpoint, the best strategy, which maximizes win probability, is to choose different paths at all time (note that this is the result of supposing \(P\ge 0.5)\). So, one of the players always uses the path \(+1\) and the other one uses the path \(-1\). This strategy has the win probability equals represented by (8).
$$\begin{aligned} P_\mathrm{win}^\mathrm{Classic} =1-\left( {1-P^{2}} \right) \end{aligned}$$
(8)
The win probability is written by considering that the probability of HBR data-type emergence is equal to win probability (using different paths in the case of at least one sender node that is sending HBR data). In (8), P represents the emergence probability of HBR data in at least one of the sender nodes.
On the contrary to classical view, quantum entanglement is capable of increasing the win probability presented in (8). Under a quantum scenario, we consider the state function given by (7), which is obtained after operating rotations of \(U_1 \) and \(U_2 \). Each player rotates its particle spin by \(\theta _H \) in the case of HBR traffic and by \(\theta _L \) otherwise. After rotation, each player selects its path based on the spin of its particle. A spin of \(+\frac{1}{2}\) results the path \(+1\) to be taken, and a spin of \(-\frac{1}{2}\) leads to utilization of path \(-1\).
Without loss of generality, we have assumed \(P=\frac{1}{2}\) for the rest of calculations provided in this section. So, the probability of emergence of HBR or LBR data equals 50%. This assumption is to be able to numerically calculate the value of the parameters in our model. However, any other values of P are also acceptable. Since each sender node may send two types of data (HBR and LBR), there are four different situations. Because we have assumed \(P=\frac{1}{2}\), these situations happen with probability of \(\frac{1}{4}\).
When both sender nodes send HBR data, they both rotate the spin of their particles by \(\alpha _1 =\alpha _2 =\theta _H \). In this situation, the nodes win if they chose opposite paths (different spins); so, the win probability in this situation equals the probability of observing either \(\left| {\uparrow \downarrow } {\rangle }\right. \) or \(\left| {\downarrow \uparrow } {\rangle }\right. \). Considering (5), the win probability is \(\sin ^{2}\left( {\theta _H } \right) \). Similarly, when nodes A and B send LBR (HBR) and HBR (LBR) data, respectively, the win probability equals the probability of observing the same spins, i.e., \(\sin ^{2}\left( {\frac{\theta _L +\theta _H }{2}} \right) \left( \sin ^{2}\left( {\frac{\theta _H +\theta _L }{2}} \right) \right) \). In the situation where both nodes send LBR data, similar discussion and considering this point that the nodes win if they choose the same paths lead us to the win probability of \(\cos ^{2}\left( {\theta _L } \right) \). All of these situations happen with probability of \(\frac{1}{4}\); so, the win probability is the sum of all above-explained probability divided by 4. Finally, the expression given by (9) provides this probability.
$$\begin{aligned} P_\mathrm{win}^\mathrm{Quantum} =\frac{1}{2}\left( {\sin ^{2}\left( {\frac{\theta _L +\theta _H }{2}} \right) +\frac{1}{2}\left( {\cos ^{2}\left( {\theta _L } \right) +\sin ^{2}\left( {\theta _H } \right) } \right) } \right) \end{aligned}$$
(9)
The formula given by (9) represents the total probability for selection of opposite paths in case of at least one HBR data and the same paths otherwise. The main task here is to maximize (9) as a function of \(\theta _H \) and \(\theta _L \) to result the best values of them. Equation (9) results a maximum of 85% success that happens in the angles which are presented in (10).
$$\begin{aligned} \theta _H= & {} 292.5\nonumber \\ \theta _L= & {} 202.5. \end{aligned}$$
(10)
Based on the above findings, we can design a routing protocol that incorporates the results of our game design. The main principles of this protocol are based on advices listed below which is given to each sender node in the network.
1.
In the case of sending HBR data, rotate your particle spin by \(\theta _H \),
 
2.
In the case of sending LBR data, rotate your particle spin by \(\theta _L \),
 
3.
Measure the spin of your particle,
 
4.
If you obtained \(+\frac{1}{2}(-\frac{1}{2})\), choose path +1 (−1).
 
As it was mentioned before, the above routing protocol needs to be designed to maximize win probability. Route selection probabilities show very promising results for balancing the network load among the intermediate nodes. The probabilities for the situation where at least one of the nodes is sending HBR traffic are listed in (11).
$$\begin{aligned} P\left( {+1,-1} \right)= & {} \% 42.5\nonumber \\ P\left( {-1,+1} \right)= & {} \% 42.5,\nonumber \\ P\left( {+1,+1} \right)= & {} \% 7.5,\nonumber \\ P\left( {-1,-1} \right)= & {} \% 7.5 \end{aligned}$$
(11)
Similarly, the probabilities for when both nodes send LBR traffic are listed in (12).
$$\begin{aligned} P\left( {+1,-1} \right)= & {} \% 7.5\nonumber \\ P\left( {-1,+1} \right)= & {} \% 7.5,\nonumber \\ P\left( {+1,+1} \right)= & {} \% 42.5,\nonumber \\ P\left( {-1,-1} \right)= & {} \% 42.5 \end{aligned}$$
(12)
The probabilities resulted by the calculations above are symmetric which leads to a balanced distribution of load under an HDR traffic and opportunity creation (or lower power consumption) under an LDR scenario. The simulation study in Sect. 6 supports the gain achieved in the proposed theory under a doublet topology configuration.

4.3.2 Triplet topology

The same formulation that was developed for the scenario of doublet topology can be applied to the triplet topology. The main difference here is that the number of relay nodes to forward the traffic from source to destinations is three and based on that the formulation needs to be adapted to efficiently utilize the capability of the third relay node in the quantum game. The triplet topology is designed to illustrate further the mechanism by which the quantum game theory can be expanded to cover more complex topology cases. Toward this aim, the topology configuration of the triplet scenario is shown in Fig. 2.
As a result of addition of the third relay, source nodes A and B have three choices to relay their data to the destination nodes G and H. We have characterized the three routing paths to be +1, 0, −1. The same winning strategies that apply to the doublet topology is applied here as well. In the classical formulation, the maximum likelihood of winning for sender nodes (as quantum players) which results by a non-overlapping strategy is 75%.
To model this problem using the quantum game theory, we need to consider three accessible intermediate paths which require a 3-state spin (particles with spin of 1). For this case, rotation matrix can be formulated according to (13).
$$\begin{aligned}&U\left( {\theta , \varphi , \alpha } \right) \nonumber \\&\quad = \left( \begin{array}{ccc} {\frac{1}{2}e^{-i\left( {\alpha +\varphi } \right) }\left( {1+\cos \theta } \right) }&{} {-\frac{1}{\sqrt{2}}e^{-i\left( \alpha \right) }\left( {\sin \theta } \right) }&{} {\frac{1}{2}e^{-i\left( {\alpha -\varphi } \right) }\left( {1-\cos \theta } \right) } \\ {\frac{1}{\sqrt{2}}e^{-i\left( \varphi \right) }\left( {\sin \theta } \right) }&{} {\cos \theta }&{} {-\frac{1}{\sqrt{2}}e^{-i\left( {-\varphi } \right) }\left( {\sin \theta } \right) } \\ {-\frac{1}{2}e^{-i\left( {-\alpha +\varphi } \right) }\left( {1-\cos \theta } \right) }&{} {\frac{1}{\sqrt{2}}e^{-i\left( {-\alpha } \right) }\left( {\sin \theta } \right) }&{} {\frac{1}{2}e^{-i\left( {-\alpha -\varphi } \right) }\left( {1-\cos \theta } \right) } \\ \end{array} \right) \nonumber \\ \end{aligned}$$
(13)
Similar to doublet case, a quantum entangled state comprised of two 1-spin particles needs to be considered. To violate the Bell inequalities and be able to benefit from the quantum states, we have focused on the state formulated by (14).
$$\begin{aligned} \left| {\psi {\rangle }_{in}}\right.= & {} 0.60\left( {{\begin{array}{l} 1 \\ 0 \\ 0 \\ \end{array} }} \right) \left( {{\begin{array}{l} 1 \\ 0 \\ 0 \\ \end{array} }} \right) +0.65\left( {{\begin{array}{l} 0 \\ 1 \\ 0 \\ \end{array} }} \right) \left( {{\begin{array}{l} 0 \\ 1 \\ 0 \\ \end{array} }} \right) +0.47\left( {{\begin{array}{l} 0 \\ 0 \\ 1 \\ \end{array} }} \right) \left( {{\begin{array}{l} 0 \\ 0 \\ 1 \\ \end{array} }} \right) \nonumber \\= & {} 0.60\left| {+1,+1{\rangle }+0.65\left| {0,0{\rangle } +0.47\left| {-1,-1}{\rangle } \right. } \right. } \right. \end{aligned}$$
(14)
Similar to the previous doublet topology, suppose that two types of data (HBR and LBR) traffic can emerge at each sender node with probability of \(\frac{1}{2}\). Using the state function in (14) and rotation operator presented in (13), the winning probabilities can be calculated. Similar to the previous case, the advisors need to tell their players to rotate their particles by \(\theta _H ,\alpha _H ,\varphi _H \) (\(\theta _L ,\alpha _L ,\varphi _L )\) in the case of HBR (LBR) transmission. After formulation of the win probability and maximization of it as a function of \(\theta _H ,\alpha _H ,\varphi _H ,\theta _L ,\alpha _L ,\varphi _L \), the angles in the optimum point are obtained and listed in (15).
$$\begin{aligned} \theta _H= & {} 142.6 \quad \theta _{L} =81.7\nonumber \\ \alpha _H= & {} 60.0 \quad \alpha _L =340.2\nonumber \\ \varphi _H= & {} 27.1 \quad \varphi _L =244.7 \end{aligned}$$
(15)
When sender nodes rotate the spin of their particles by above angles, the joint paths are chosen by following probabilities in different situations in which sender nodes send different traffic loads.
In Table 1, HL means node A sends HBR and node B sends LBR data. For the angle values listed in (15), the \(P_{\text {win}} \) is calculated to be 91%. Hence, utilization of entangled particles can increase the probability of winning by 16% compared to classical methods. Similar to the doublet topology, the probabilities of choosing opposite paths are symmetric in the triplet topology which can theoretically lead to load balancing at the intermediate relay nodes. This claim is supported by the simulation study of this theory provided in Sect. 6.
Table 1
Joint probabilities for path selection by sender nodes in triplet topology
 
HH (%)
HL (%)
LH (%)
LL (%)
\(P\left( {+1 , 0} \right) \)
10
19
16
0
\(P\left( {+1 , -1} \right) \)
20
10
16
0
\(P\left( {0 ,+1} \right) \)
10
16
19
0
\(P\left( {0 , -1} \right) \)
15
9
19
0
\(P\left( {-1 ,+1} \right) \)
20
16
10
0
\(P\left( {-1 , 0} \right) \)
15
19
9
0
\(P\left( {+1,+1} \right) \)
2
4
4
36
\(P\left( {0 , 0} \right) \)
5
5
5
42
\(P\left( {-1 ,-1} \right) \)
3
2
2
22
In the case of triplet topology, the quantum advice is as stated below.
1.
In the case of sending HBR data, rotate your particle spin by \(\theta _H , \alpha _H , \varphi _H \),
 
2.
In the case of sending LBR data, rotate your particle spin by \(\theta _L , \alpha _L , \varphi _H \),
 
3.
Measure the spin of your particle,
 
4.
The result of your spin measurement decides which path to take.
 
Theoretically under the triplet topology, the probability of win is increased by 16% compared to the classical methods.

5 Ad hoc load balancing problem definition

As mentioned earlier, the problem targeted by this work is load balancing in ad hoc networks. As it was elaborated in Sect. 3, load balancing is one of the major challenges in ad hoc networks. The work presented in this paper and the simulation followed by it is to introduce an entirely novel load balancing technique using quantum game theory as explained in Sect. 4. Furthermore, incorporate this load balancing algorithm into a fully functional routing protocol. The focus of this section is to define the problem of load balancing from the authors’ point of view.
One of the cases in ad hoc networks where load balancing is critical is when there exist some relay nodes among source/destination pairs and the relaying of traffic is shared among them. An example of such case which has been studied in this work is shown in Fig. 1, where source nodes A and B share relay nodes C and D to forward their traffic to destination nodes G and H.
Balance distribution of network load among relay nodes C and D has a direct impact on end-to-end delay, packet jitter, throughput, network stability and connectivity. Current conventional ad hoc routing protocols do not take load balancing into account which is the motivation of this paper in targeting this problem. Referring to Fig. 1, in the current ad hoc routing protocols source nodes A and B randomly choose relay nodes C and D as their next hop route without considering the level of traffic load that is being sent by them. Under high network load conditions, this would result in unbalance distribution of load among the relay nodes. The unbalanced relaying of data packets creates random queues at relay nodes which result relatively high end-to-end delays. On the other hand, under heavy network load conditions, packets perform random switching among free and busy relays which result unstable packet jitters. Additionally, depending on the network load, long queues at relay nodes can cause buffer overflows which affect packet delivery ratio (PDR) as well as throughput. Hence, we can conclude that balance distribution of network load among relay nodes can have a great impact on QoS related measures.

5.1 OLSR routing protocol as the baseline of implementation

The importance of balanced relaying of the network traffic forwarded by relay nodes is extensively studied in this work. Via simulation studies, we have shown that balance relaying of the network traffic among the relays can directly impact and improve QoS factors such as end-to-end delay and jitter in the network. As it was explained in Sect. 3, routing protocols are the most suitable agents to implement load balancing algorithms. Toward this aim, OLSR [35] is used as the base routing protocol to implement our load balancing algorithm. OLSR is a proactive routing protocol which proactively uses signaling mechanisms to create and update the network topology graph. The load-balanced routing protocol implemented by this work is so-called quantum load balanced-OLSR (QLB-OLSR). One of the reasons why OLSR was the choice of the routing protocol in this work is that the primary requirement of the load balancing mechanism presented in this paper is to have the full network topology graph. Having full network graph is necessary for identification of the segments of the network where quantum load balancing (QLB) can be applied. The identification process consists of evaluating whether a number of relay nodes are common among the source/destination pairs.

6 QLB-OLSR simulations and results

In this section, we used a simulation study to analyze the performance of the proposed joint load balancing and routing algorithm (QLB-OLSR). The simulations were implemented using OMNET++ Discrete Event Simulator.

6.1 Simulation setup and assumptions

We consider two cases of load balancing for the simulation study, one with 2 relay nodes and the other with 3 relays. The network topology under study by this work is shown in Fig. 3. The topology shown in this figure is the 3-relay topology setup, whereas in the case of 2-relay setup node E is eliminated. We have setup node A and node B as source nodes which have node G and node H as a destination. In the case of 2-relay study, node C and node D are the only relays to forward the traffic flow to the destination. However, node E is added to this setup as the third relay.
To be able to evaluate the performance of QLB-OLSR accurately, we have defined two traffic types of high and low. The low load traffic produces constant bitrate (CBR) at the rate of 10 Kbps, and the high load traffic is generated at the rate of 1 Mbps. Under a realistic network environment, source nodes may randomly change their traffic load. As the target of this work is to evaluate the performance of the protocol under the worst-case scenario, this behavior has been simulated using a random scheduling mechanism which randomly switches the traffic load between high and low at every \(\Delta t\) seconds. \(\Delta t\) is set to be 10s in this work.
Hence, at every 10 s, the source node 5 and node 6 would randomly and independently switch their application layer traffic between 10kbps and 1Mbps. This helps us evaluate the convergence time of the QLB-OLSR to changes in the network traffic and mainly its effect on the QoS factors.
The simulation assumptions used in this work are listed below:
(1)
All nodes are equipped with IEEE 802.11 WLAN interfaces
 
(2)
Sender nodes have quantum entanglement capability
 
(3)
Sender nodes have spin rotation and measurement capability
 
Points 2 and 3 of the simulation assumptions are necessitated by the quantum game theoretical approach used in this work.

6.2 Simulation parameters

OMNET++ was used as the simulation platform to implement and evaluate the performance of QLB-OLSR. The simulation was left to run for 9000 s. To improve confidence level in the results and reduce the error, the results are averaged over 50 simulation runs with different seed sets. CBR traffic was used as the application layer traffic in this work. Furthermore, User Datagram Protocol (UDP) was used as the transport layer protocol. The reason for this choice was that UDP does not have an automatic re-transmission mechanism (as opposed to TCP which does), and this would help us highlight the actual performance of our algorithm. Additionally, IPv4 was used as the network layer protocol. As it was mentioned before, IEEE 802.11g was the choice of MAC and PHY layer protocol due to popularity in the research community. All the simulation parameters are listed in Table 2.

6.3 Simulation results

In this section, we have summarized the simulations results and discussed the performance of QLB-OLSR based on them. The results are reported in two sections of 2-relay and 3-relay study to be able to focus separately on the performance of QLB-OLSR under these two scenarios. The focus of our simulation result analysis is based on, throughput balance, jitter and end-to-end delay which as it was elaborated in Sect. 5 are the most important QoS factors.
Table 2
Simulation parameters
Simulation parameters
Value
Simulation platform
Omnet++ 4.2.2
Simulation time
9000 s
Number of runs
50
Total nodes
6 (2-Relay)/7 (3-Relay)
(Sender/receiver)
4
(Relays)
2 (2-Relay)/3 (3-Relay)
Application
CBR
Application packet size
512 bytes
Transmission interval
 
   Low load
0.4096 s (10 Kbps)
   High load
0.004096 s (1 Mbps)
Transport protocol
UDP
Network protocol
IPv4
IP fragmentation unit
1500b
Mac protocol
IEEE 802.11g
MAC max queue size
50
Packet retry limit
7
Physical layer model
PHY 802.11
Wireless frequency band
2.4 GHz
Propagation limit
\(-111.0\)  dBm
Data rate
54 Mbps
Mode
G
Nodes Tx power
30 mW (\(\cong 15\, \mathrm{dBm})\)
Shadowing model
Constant
Channel model
Rayleigh model
Shadowing mean
4.0 dB
Receiver sensitivity
\(-85\)  dBm
Path loss
2.4
Thermal noise
\(-110\)  dBm

6.4 2-Relay simulation study

In this section, we have compared the performance of baseline OLSR routing algorithm with the QLB-OLSR, which implements the load balancing algorithm introduced by this work. The performance comparison is based on three metrics, throughput unbalanced factor, end-to-end delay and jitter.

6.4.1 Throughput unbalanced factor (TUF)

To be able to analyze the balance distribution of throughput better over the relay nodes, we have defined a metric called throughput unbalance factor (TUF). Throughput is measured at the relay nodes to represent the balance of load distribution among them. The measured throughput is a function of time which then by division of that with the total throughput that is being relayed by all relays we can calculate normalized throughput parametrized as \(Th_N \left( t \right) \) in (16). D is the distribution factor which, as shown in (17), has an inverse relationship with the number of relay nodes n in our simulation setup. As shown in (18), by subtracting D from \(Th_N \left( t \right) \) we can evaluate \(\mathrm{TUF} \left( t \right) \). Hence, TUF is a measure of how unbalance the traffic load is distributed over the relays with taking the perfect load balancing D as reference measure. The lower the value of TUF represents better load balancing and better performance.
$$\begin{aligned} Th_N \left( t \right)= & {} \frac{\text{ Throughput }\left( t \right) }{\text{ Total }\_ \text {Throughput}} \end{aligned}$$
(16)
$$\begin{aligned} D= & {} \frac{1}{n} \end{aligned}$$
(17)
$$\begin{aligned} \mathrm{TUF}\left( t \right)= & {} \left| {Th_N \left( t \right) -D} \right| \end{aligned}$$
(18)
The box plot shown in Fig. 4 compares the TUF of the baseline OLSR routing protocol to the quantum case which simply is the QLB-OLSR. In the result section of this work, quantum is used to refer to the QLB-OLSR routing algorithm.
As shown in Fig. 4, we have achieved 89% gain in the mean value of TUF in the quantum case when compared to baseline.
Furthermore, it was measured that 50% hinge spread of TUF samples in quantum case also had an 89% gain when compared to baseline OLSR.
Figure 5 visualizes the same data as shown in Fig. 4, using a time plot. We can clearly conclude that in the 2-relay scenario, not only we have achieved significant gain in load balancing among the relay nodes but the statistical spread of TUF has improved considerably. It is important to note that the TUF reported here is averaged over the 2 relays.

6.4.2 End-to-end delay

End-to-end delay for both baseline and quantum cases are visualized using the box plot in Fig. 6. It can be observed that the end-to-end delay performance is nearly the same when comparing the case of quantum with baseline. Given that the number of hops between the source/destination pairs in the simulation study performed in this work is very limited, we do not expect to see any significant improvements in terms of end-to-end delay in the 2-relay scenario. It is only under a large network topology with multiple hops in the routing paths that QLB-OLSR could show performance improvement regarding end-to-end delay

6.4.3 Jitter

Jitter is considered as one of the most important QoS factors. The performance of the baseline protocol has been compared with the quantum case in Fig. 7 QLB-OLSR has achieved 13% gain compared to the baseline OLSR. Additionally, there is a 14% stability gain obtained when comparing the proposed quantum case with the baseline. It must be noted that a 14% jitter gain in the small topology simulated in this work indicates that the load balancing performed by the QLB-OLSR algorithm can result in a significant improvement in large network scenarios.

6.5 3-Relay simulation study

6.5.1 Throughput unbalanced factor

The box plot which is shown in Fig. 8 compares the performance of QLB-OLSR against the baseline OLSR routing protocol under a 3-relay scenario. Based on our measurement, there is a 50% mean gain when comparing the newly proposed algorithm against the baseline. The stability gain of the protocol is measured at 66% which shows stable load balancing consistency under a 3-relay scenario as well. Under this scenario, the theoretically calculated gain based on the quantum game strategies is lower than the 2-relay scenario. Hence, it can be concluded that the simulation results are in line with the theoretical analysis on the quantum load balancing performed in Sects. 4.3.1 and 4.3.2. The time graph shown in Fig. 9 visualizes the performance comparison of the QLB-OLSR algorithm against baseline. This graph also confirms the performance gains achieved by the proposed protocol.

6.5.2 End-to-end delay

When we look at the end-to-end delay performance of the QLB-OLSR compared to baseline in Fig. 10, we can see 21% improvement in the mean delay of the proposed algorithm compared to the baseline. We can also report a significant 29% stability gain in the proposed algorithm. As opposed to the 2-relay scenario where the performance of the proposed algorithm is similar to the baseline, in the case of the 3-relay, we can observe a significant gain. Due to the lack of any load balancing mechanism in the baseline OLSR, the performance drops significantly under a 3-relay scenario. However, the QLB-OLSR algorithm performs a fair load distribution across all relays and reduces the probability of unbalanced queues at relays which leads to lower end-to-end delay as well as better stability in the measured performance. The stability of end-to-end delay has a direct impact on the QoS in the chosen paths; hence, it would directly affect the quality of routes computed in the network.

6.5.3 Jitter

The box plot which is shown in Fig. 11 compares the performance of the QLB-OLSR algorithm against the baseline OLSR based on jitter delay. As it was mentioned before, jitter is one of the most important QoS factors in any network which affects the quality of services provided in the application layer. The mean gain in the performance of the quantum algorithm was measured at 29% compared to the baseline OLSR. Furthermore, the stability gain is at 26% which proofs that the load balancing algorithm has a better jitter consistency compared to the baseline protocol.

7 Conclusion

In this paper, we have evaluated performance of quantum game-based approach to load balancing. First, we formulated the problem of load balancing in ad hoc networks under the umbrella of quantum game theory. We then showed that the synchronization of entangled particles can be used to affect the decision-making process of distant players without transmission of any information. This enabled us to formulate the problem of load balancing in ad hoc networks using the novel concept of quantum game theory. Hence, the weakness of backpressure algorithm in performing fair load distribution was targeted by the synchronization properties of entangled particles. We also discussed that the physical states of a system need to be in violation of the bell inequalities for it to be considered under a quantum paradigm. The larger accessible space of states in a quantum system can be used to maximize a pre-defined utility function. We formulated the utility function of the quantum games based on the problem of load balancing in ad hoc networks. In order to be able to implement and analyze our theory, we harmonized the problem of load balancing with the quantum strategies resulted by the theoretical analysis of this work. The proposed theory was implemented in the OLSR routing algorithm as the baseline of the implementation. The so-called QLB-OLSR routing protocol was thoroughly analyzed based on simulation studies, and a significant performance gain was reported. The simulation study in this chapter confirms the expected performance gain in the theoretical analysis of the quantum load balancing. The 2-relay and 3-relay scenarios presented in this work stand as proof of concepts for the proposed theory which shows promise as a solution to the problem of load balancing in ad hoc networks. In a CR-MANETs environment with multiple SOPs, the load balancing can result even more gain due to the added capacity. The work presented in this presents a novel new perspective to target load balancing and stands as a proof of concept to our proposed theory. To apply QLB algorithm to larger more complex networks, a generalized quantum game theoretical analysis regardless of the number of relay nodes is required, which involves extremely complex quantum state calculations. Expansion of the QLB algorithm to larger network scenarios is considered as the future work of this research. Furthermore by applying the QLB algorithm to MANETs which support mobility, it is expected to get more stable routes in such networks.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Anhänge

Appendix

The implementation of the QLB in OLSR as the baseline routing protocol is covered in this “Appendix”.

Topology identification

We have modeled our quantum game theory based on the cases where we have either 2 common Relays or 3 common Relays among the source/destination pairs. Our quantum load balancing algorithm can automatically detect the existence of 2 or 3 common relays and based on that use the appropriate probability sets which is the result of the mathematical modeling summarized in Sect. 4.3. Hence, matching the network topology to the load balancing strategy that QLB can manage is vital. The assumption in this work is that OLSR operates normally to compute the routing tables and the QLB algorithm affects the computed routes by OLSR when necessary. Based on QLB algorithm, the source nodes are notified via OLSR signaling if they have common relays with the destinations nodes. We have modified the structure of OLSR’s routing table so that for every destination, it accommodates the address of possible common relays it has with the current node. In order to achieve this, we have added a new mechanism in the way OLSR’s HELLO messages are processed. When a node receives HELLO messages from different senders which have one common address listed in their address field, then the sender nodes with the common address fields would be listed as the common relays for that specific destination in the routing table. The destination will be taken from the common address in the sender’s address field. By this method, OLSR’s proactive signaling mechanism helps the source nodes to identify the common relays.

Traffic-based load balancing

Our quantum game for load balancing has been designed based on the level of application layer traffic. There are two types of traffic defined in this work, one representing a high network load and the other a low network load. Based on these two categories of traffic the quantum game defines two strategies, one being load balancing and the other resource conservation. The logic behind defining these two strategies is that under a low load condition the traffic can be relayed over one common relay node which results conservation of the other common relay nodes resources. On the other hand, under heavy load, its best to evenly distribute the traffic over the common relay nodes based on the reasons explained in Sect. 5. The probabilities listed in Sect. 4 are calculated based on the quantum game theory and entanglement to achieve success in the strategies defined in our quantum game.

Quantum load balancing reality versus simulation

One of the main assumptions in our proposed load balancing algorithm is that nodes have quantum entanglement and spin rotation and measurement capability. The load balancing strategies proposed based on game theory in this work, highly depends on the properties of quantum entanglement. It is only with the properties of entangled particles that distant nodes can affect the decision-making process of each other. However under the simulation environment, quantum entanglement is not available to sender nodes. To treat this in our simulation, we have used the final results for probabilities of selecting joint paths by both sender nodes. In fact, if sender nodes use the quantum advices mentioned in Sect. (4.3), the probability of selecting different paths is given by these probabilities. It must be noted that we use these probabilities that are the results of our theoretical analysis provided in this work to force sender nodes select paths like when they utilize the quantum advices presented in Sect. (4.3). In reality, there is not any capability for saying sender nodes to choose appropriate paths in different situations. In reality sender nodes use entangled particles to affect the other sender nod’s strategy. Using entangled particles by sender nodes results they choose the appropriate paths by probabilities obtained in Sect. (4.3) without sending any information about what path they selected for sending data. Instantaneous Load Balancing
One of the main challenges faced in the implementation of the quantum load balancing is the assumption that source nodes which share common relays, start their transmission instantaneously. Looking back at Fig. 3, quantum load balancing game is theoretically defined with the assumption that source nodes A and B would always have data packets to be sent and for every packet that is being sent by source node A there is another packet being sent at the exact same time by node B. With this assumption, the probability of choosing either relay node C or D as the next hop would depend on the values listed in Sect. 4. However this assumption is impractical under a realistic network environment where nodes can start and end their transmission at different times; this is resulted by the fact that packets may experience random delays which makes synchronization of their transmission time almost impossible and impractical. To address this problem, we came up with the idea of periodic time scheduling in order to create and cache the probability distributions over a short time interval \(\Delta t\). In a simulation environment, probabilities are managed by generation of random numbers and matching their outcome space to the value of the intended probability. The idea is that at every time interval \(\Delta t\), a new random number is generated and cached to be used by source nodes 5 and 6 during the next time interval defined as \(\Delta t\). During this time the source nodes use the cached value of the random number to implement the probabilities.

QLB algorithm under simulation environment

As it was explained before the simulation-based implementation of the QLB algorithm is slightly different to real functionality of our proposed algorithm. Under the simulation environment the probabilities which is the result of the theoretical analysis of quantum game theory are used to simulate our algorithm.
In Section VII.A, the topology identification process for a condition with the potential for quantum load balancing was elaborated. This mechanism enables our algorithm to identify the potential relays for applying the QLB algorithm. The QLB algorithm requires two inputs from the node to be able to perform load balancing. One of which is the destination node where the data packet is being sent to and the other is the current application layer transmission data rate. The application layer data rate and the destination nodes help the algorithm to find a match in quantum probabilities listed in Sect. 4. This step is just in simulation environment and does not happen in reality. Algorithm 1 is the pseudocode for the QLB algorithm that is implemented by this work. The algorithm starts at line 1 with an IF Statement checking listener call from application layer for data transmission, as soon as this listener gets activated the QLB procedure gets executed. The listener call carries the object appDataReq. At line 2, while there are data to be sent in the appDataReq object, the algorithm needs to evaluate whether load balancing can be performed, hence the while-loop iterates. Initially the destNode is extracted from the appDataReq object which as explained before, it is one of the inputs required to perform the QLB algorithm. As it was explained in the Section VII.A, QLB algorithm performs topology matching to identify the potential topologies where load balancing can be applied. The hasCommRelay method in line 4 returns a Boolean to confirm that the current node has a common relay with the destination node. Under the condition where this relay exist, then the QLB algorithm can apply the load balancing mechanism.
Algorithm 1. Quantum load balancing (QLB) algorithm
At line 5, the data rate of the application layer traffic is extracted from the appDataReq object, hence the application layer is required to attach the current traffic data rate with the traffic request objects. As it was elaborated in Section 0, a quantum cached probability scheduling mechanism is implemented by this work to virtually simulate the game defined by quantum load balancing. At line 6 the value of this cached probability is requested by reqCurrCachRandNum method and stored in chachRandNum. At line 7 and 12 the two conditions of 2 and 3 common relay cases are checked. Based on the number of common relays (2 or 3) the appropriate QLB probability tables will be used to find the next hop relay for routing of the application data packet. At line 9 and 14, the probReq method is called on the appropriate data set utilizing the objects destNode, appDataRate and chachRandNum; these three are the inputs required to match a next hop relay in the appropriate QLB probability table. Finally, at line 18, using the routeAppData method the nxtHopRely is used to route the current data packet from the appDataReq object. Going back to line 4, if there is no common relay between the destination and the current node, at line 21, the data packet would be routed using the normal OLSR routing algorithm.
Based on QLB algorithm, when there are application layer data packets at source nodes, quantum entanglement and game theoretical strategies are used to manage the traffic relaying among the source/destination nodes which share 2 or 3 common relays. In case of high load traffic the algorithm tries to maximize even distribution of the traffic flow among relay nodes. On the other hand, under a low load traffic, by maximizing usage of only one of the relays the other node’s resources are conserved. The logic behind QLB algorithm is that high load traffic flows can benefit more from traffic distribution compared to low load traffic flows.
Literatur
1.
Zurück zum Zitat Zhangjie, F., Xingming, S., Qi, L., Lu, Z., Jiangang, S.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Inf. Syst. 98, 190–200 (2015) Zhangjie, F., Xingming, S., Qi, L., Lu, Z., Jiangang, S.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Inf. Syst. 98, 190–200 (2015)
2.
Zurück zum Zitat Park, D.: Introduction to the Quantum Theory. Courier Corporation, North Chelmsford (2012) Park, D.: Introduction to the Quantum Theory. Courier Corporation, North Chelmsford (2012)
3.
Zurück zum Zitat Benjamin, S.C., Hayden, P.M.: Multiplayer quantum games. Phys. Rev. A 64, 030301 (2001)ADSCrossRef Benjamin, S.C., Hayden, P.M.: Multiplayer quantum games. Phys. Rev. A 64, 030301 (2001)ADSCrossRef
5.
Zurück zum Zitat Brunner, N., Linden, N.: Connection between Bell nonlocality and Bayesian game theory. Nat. Commun. 4, 1 (2013)ADS Brunner, N., Linden, N.: Connection between Bell nonlocality and Bayesian game theory. Nat. Commun. 4, 1 (2013)ADS
6.
Zurück zum Zitat Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M.H.: Probabilistic quantum relay communication in the noisy channel with analogous space-time code. Quantum Inf. Process. 12, 1859–1870 (2013)ADSMathSciNetCrossRefMATH Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M.H.: Probabilistic quantum relay communication in the noisy channel with analogous space-time code. Quantum Inf. Process. 12, 1859–1870 (2013)ADSMathSciNetCrossRefMATH
7.
Zurück zum Zitat Shi, J., Shi, R., Peng, X., Guo, Y., Lee, M.H.: Quantum relay cooperative communication via space-time transmission. Quantum Inf. Comput. 15, 660–676 (2015)MathSciNet Shi, J., Shi, R., Peng, X., Guo, Y., Lee, M.H.: Quantum relay cooperative communication via space-time transmission. Quantum Inf. Comput. 15, 660–676 (2015)MathSciNet
8.
Zurück zum Zitat Shi, J., Shi, R., Peng, X., Li, Y., Guo, Y.: Distributed quantum packet transmission in non-maximally entangled relay system. Int. J. Theor. Phys. 54, 1128–1141 (2015)CrossRefMATH Shi, J., Shi, R., Peng, X., Li, Y., Guo, Y.: Distributed quantum packet transmission in non-maximally entangled relay system. Int. J. Theor. Phys. 54, 1128–1141 (2015)CrossRefMATH
9.
Zurück zum Zitat Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)CrossRef Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)CrossRef
10.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27, 340–352 (2016)CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27, 340–352 (2016)CrossRef
11.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016)CrossRef Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016)CrossRef
12.
Zurück zum Zitat Barrett, C., Marathe, A., Marathe, M.V., Drozda, M.: Characterizing the interaction between routing and MAC protocols in ad-hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, NY, pp. 92–103 (2002) Barrett, C., Marathe, A., Marathe, M.V., Drozda, M.: Characterizing the interaction between routing and MAC protocols in ad-hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, NY, pp. 92–103 (2002)
13.
Zurück zum Zitat Royer, E.M., Sung-Ju, L., Perkins, C.E.: The effects of MAC protocols on ad hoc network communication. In: 2000 IEEE Wireless Communications and Networking Conference, 2000. WCNC, vol. 2, pp. 543–548 (2000) Royer, E.M., Sung-Ju, L., Perkins, C.E.: The effects of MAC protocols on ad hoc network communication. In: 2000 IEEE Wireless Communications and Networking Conference, 2000. WCNC, vol. 2, pp. 543–548 (2000)
14.
Zurück zum Zitat Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18, 535–547 (2000)CrossRef Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18, 535–547 (2000)CrossRef
15.
Zurück zum Zitat Ade, S., Tijare, P.: Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. Int. J. Inf. Technol. Knowl. Manag. 2, 545–548 (2010) Ade, S., Tijare, P.: Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. Int. J. Inf. Technol. Knowl. Manag. 2, 545–548 (2010)
16.
Zurück zum Zitat Draves, R., Padhye, J., Zill, B.: Comparison of routing metrics for static multi-hop wireless networks. Paper presented at the proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications, Portland, Oregon, USA (2004) Draves, R., Padhye, J., Zill, B.: Comparison of routing metrics for static multi-hop wireless networks. Paper presented at the proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications, Portland, Oregon, USA (2004)
17.
Zurück zum Zitat Chai Keong, T., Anh-Ngoc, L., You-Ze, C.: Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Commun. Mag. 47, 78–84 (2009)CrossRef Chai Keong, T., Anh-Ngoc, L., You-Ze, C.: Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Commun. Mag. 47, 78–84 (2009)CrossRef
18.
Zurück zum Zitat Joo-Han, S., Wong, V., Leung, V.C.M.: Load-aware on-demand routing (LAOR) protocol for mobile ad hoc networks. In: The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003, Spring, vol. 3, pp. 1753–1757 (2003) Joo-Han, S., Wong, V., Leung, V.C.M.: Load-aware on-demand routing (LAOR) protocol for mobile ad hoc networks. In: The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003, Spring, vol. 3, pp. 1753–1757 (2003)
19.
Zurück zum Zitat Altalhi, A.H., Richard III, G.G.: Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks. In: IEEE International Conference on Performance, Computing, and Communications 2004, pp. 407–413 (2004) Altalhi, A.H., Richard III, G.G.: Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks. In: IEEE International Conference on Performance, Computing, and Communications 2004, pp. 407–413 (2004)
20.
Zurück zum Zitat Toh, C.-K.: Associativity-based routing for ad hoc mobile networks. Wirel. Pers. Commun. 4, 103–139 (1997)CrossRef Toh, C.-K.: Associativity-based routing for ad hoc mobile networks. Wirel. Pers. Commun. 4, 103–139 (1997)CrossRef
21.
Zurück zum Zitat Hassanein, H., Zhou, A.: Routing with load balancing in wireless Ad hoc networks. Paper presented at the proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, Rome, Italy (2001) Hassanein, H., Zhou, A.: Routing with load balancing in wireless Ad hoc networks. Paper presented at the proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, Rome, Italy (2001)
22.
Zurück zum Zitat Yang, L., Hong, M.: Three load metrics for routing in ad hoc networks. In: 2004 IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall, vol. 4, pp. 2764–2768 (2004) Yang, L., Hong, M.: Three load metrics for routing in ad hoc networks. In: 2004 IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall, vol. 4, pp. 2764–2768 (2004)
23.
Zurück zum Zitat Sung-Ju, L., Gerla, M.: Dynamic load-aware routing in ad hoc networks. In: IEEE International Conference on Communications, 2001. ICC 2001, vol. 10, pp. 3206–3210 (2001) Sung-Ju, L., Gerla, M.: Dynamic load-aware routing in ad hoc networks. In: IEEE International Conference on Communications, 2001. ICC 2001, vol. 10, pp. 3206–3210 (2001)
24.
Zurück zum Zitat Yi, Y., Kwon, T., Gerla, M.: A load aWare routing (LWR) based on local information. In: 2001 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, pp. G-65–G-69 (2001) Yi, Y., Kwon, T., Gerla, M.: A load aWare routing (LWR) based on local information. In: 2001 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, pp. G-65–G-69 (2001)
25.
Zurück zum Zitat Shen, J., Tan, H.-W., Wang, J., Wang, J.-W., Lee, S.-Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. 16, 171–178 (2015) Shen, J., Tan, H.-W., Wang, J., Wang, J.-W., Lee, S.-Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. https://static-content.springer.com/image/art%3A10.1007%2Fs11128-017-1578-y/MediaObjects/11128_2017_1578_Figb_HTML.gif 16, 171–178 (2015)
26.
Zurück zum Zitat Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78, 231–246 (2014)CrossRef Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78, 231–246 (2014)CrossRef
27.
Zurück zum Zitat Ganjali, Y., Keshavarzian, A.: Load balancing in ad hoc networks: single-path routing vs. multi-path routing. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1120–1125 (2004) Ganjali, Y., Keshavarzian, A.: Load balancing in ad hoc networks: single-path routing vs. multi-path routing. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1120–1125 (2004)
28.
Zurück zum Zitat Joo-Han, S., Wong, V.W.S., Leung, V.C.M.: Efficient on-demand routing for mobile ad-hoc wireless access networks. In: Global Telecommunications Conference, 2003. GLOBECOM ’03. IEEE, vol. 1, pp. 558–563 (2003) Joo-Han, S., Wong, V.W.S., Leung, V.C.M.: Efficient on-demand routing for mobile ad-hoc wireless access networks. In: Global Telecommunications Conference, 2003. GLOBECOM ’03. IEEE, vol. 1, pp. 558–563 (2003)
29.
Zurück zum Zitat Pearlman, M.R., Haas, Z.J.: Determining the optimal configuration for the zone routing protocol. IEEE J. Sel. Areas Commun. 17, 1395–1414 (1999)CrossRef Pearlman, M.R., Haas, Z.J.: Determining the optimal configuration for the zone routing protocol. IEEE J. Sel. Areas Commun. 17, 1395–1414 (1999)CrossRef
30.
Zurück zum Zitat Jie, G., Li, Z.: Load-balanced short-path routing in wireless networks. IEEE Trans. Parallel Distrib. Syst. 17, 377–388 (2006)CrossRef Jie, G., Li, Z.: Load-balanced short-path routing in wireless networks. IEEE Trans. Parallel Distrib. Syst. 17, 377–388 (2006)CrossRef
31.
Zurück zum Zitat Liu, H.I., Yen, P.C.: \(\text{LB}^{2}\text{ R }\): a load balanced & location based routing protocol for ad-hoc networks. In: 2004 IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. vol. 6, pp. 3970–3974 (2004) Liu, H.I., Yen, P.C.: \(\text{LB}^{2}\text{ R }\): a load balanced & location based routing protocol for ad-hoc networks. In: 2004 IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. vol. 6, pp. 3970–3974 (2004)
32.
Zurück zum Zitat Bell, J.S.: Speakable and Unspeakable in Quantum Mechanics: Collected Papers on Quantum Philosophy. Cambridge University Press, Cambridge (2004)CrossRef Bell, J.S.: Speakable and Unspeakable in Quantum Mechanics: Collected Papers on Quantum Philosophy. Cambridge University Press, Cambridge (2004)CrossRef
33.
Zurück zum Zitat Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)ADSMathSciNetCrossRefMATH Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)ADSMathSciNetCrossRefMATH
34.
Zurück zum Zitat Deutsch, D., Ekert, A., Jozsa, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77, 2818 (1996)ADSCrossRef Deutsch, D., Ekert, A., Jozsa, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77, 2818 (1996)ADSCrossRef
35.
Zurück zum Zitat Jacquet, P., Mühlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Technology for the 21st Century. Proceedings of the IEEE International Multi Topic Conference, IEEE INMIC 2001, pp. 62–68 (2001) Jacquet, P., Mühlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Technology for the 21st Century. Proceedings of the IEEE International Multi Topic Conference, IEEE INMIC 2001, pp. 62–68 (2001)
Metadaten
Titel
Quantum load balancing in ad hoc networks
verfasst von
M. Hasanpour
S. Shariat
P. Barnaghi
S. A. Hoseinitabatabaei
S. Vahid
R. Tafazolli
Publikationsdatum
01.06.2017
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 6/2017
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1578-y

Weitere Artikel der Ausgabe 6/2017

Quantum Information Processing 6/2017 Zur Ausgabe

Neuer Inhalt