5 research outputs found
THE PRICE OF NON-COOPERATION IN RESERVATION-BASED BANDWIDTH SHARING PROTOCOLS
ABSTRACTIn reservation-based bandwidth sharing protocols, the base station relies on the stations’ requests to allocate time slots to them. Like most other protocols, reservation-based protocols were designed with the assumption that all stationsrespect the rules of the protocols. However, as mobile devices are becoming more intelligent andprogrammable, they can selfishly optimize their operations to obtain a larger share of commonbandwidth. Here, we study reservation-based bandwidth sharing protocols considering the existence of selfish stations through game-theoretic perspectives. We show that this game admits a Nash equilibrium. Then, we prove the inefficiency of the Nash equilibrium. Game-theoretical analysis shows that local optimization in the bandwidth sharing problem with conflicted interests does not lead to any global optimization.Keywords. Nash equilibrium, Repeated game, Reservation-based
A quantitative comparison of multiple access control protocols for wireless ATM
The multiple access control (MAC) problem in a wireless network has intrigued researchers for years. For a broad-band wireless network such as wireless ATM, an effective MAC protocol is very much desired because efficient allocation of channel bandwidth is imperative in accommodating a large user population with satisfactory quality of service. Indeed, MAC protocols for a wireless ATM network in which user traffic requirements are highly heterogeneous (classified into CBR, VBR, and ABR), are even more intricate to design. Considerable research efforts expended in tackling the problem have resulted in a myriad of MAC protocols. While each protocol is individually shown to be effective by the respective designers, it is unclear how these different protocols compare against each other on a unified basis. In this paper, we quantitatively compare seven recently proposed TDMA-based MAC protocols for integrated wireless data and voice services. We first propose a taxonomy of TDMA-based protocols, from which we carefully select seven protocols, namely SCAMA, DTDMA/VR, DTDMA/PR, DQRUMA, DPRMA, DSA++, and PRMA/DA, such that they are devised based on rather orthogonal design philosophies. The objective of our comparison is to highlight the merits and demerits of different protocol designs.published_or_final_versio