1,939 research outputs found
Social Data Offloading in D2D-Enhanced Cellular Networks by Network Formation Games
Recently, cellular networks are severely overloaded by social-based services,
such as YouTube, Facebook and Twitter, in which thousands of clients subscribe
a common content provider (e.g., a popular singer) and download his/her content
updates all the time. Offloading such traffic through complementary networks,
such as a delay tolerant network formed by device-to-device (D2D)
communications between mobile subscribers, is a promising solution to reduce
the cellular burdens. In the existing solutions, mobile users are assumed to be
volunteers who selfishlessly deliver the content to every other user in
proximity while moving. However, practical users are selfish and they will
evaluate their individual payoffs in the D2D sharing process, which may highly
influence the network performance compared to the case of selfishless users. In
this paper, we take user selfishness into consideration and propose a network
formation game to capture the dynamic characteristics of selfish behaviors. In
the proposed game, we provide the utility function of each user and specify the
conditions under which the subscribers are guaranteed to converge to a stable
network. Then, we propose a practical network formation algorithm in which the
users can decide their D2D sharing strategies based on their historical
records. Simulation results show that user selfishness can highly degrade the
efficiency of data offloading, compared with ideal volunteer users. Also, the
decrease caused by user selfishness can be highly affected by the cost ratio
between the cellular transmission and D2D transmission, the access delays, and
mobility patterns
The Value of Information in Selfish Routing
Path selection by selfish agents has traditionally been studied by comparing
social optima and equilibria in the Wardrop model, i.e., by investigating the
Price of Anarchy in selfish routing. In this work, we refine and extend the
traditional selfish-routing model in order to answer questions that arise in
emerging path-aware Internet architectures. The model enables us to
characterize the impact of different degrees of congestion information that
users possess. Furthermore, it allows us to analytically quantify the impact of
selfish routing, not only on users, but also on network operators. Based on our
model, we show that the cost of selfish routing depends on the network
topology, the perspective (users versus network operators), and the information
that users have. Surprisingly, we show analytically and empirically that less
information tends to lower the Price of Anarchy, almost to the optimum. Our
results hence suggest that selfish routing has modest social cost even without
the dissemination of path-load information.Comment: 27th International Colloquium on Structural Information and
Communication Complexity (SIROCCO 2020
Efficient wireless packet scheduling in a non-cooperative environment: Game theoretic analysis and algorithms
In many practical scenarios, wireless devices are autonomous and thus, may exhibit non-cooperative behaviors due to self-interests. For instance, a wireless cellular device may be programmed to report bogus channel information to gain resource allocation advantages. Such non-cooperative behaviors are highly probable as the device's software can be modified by the user. In this paper, we first analyze the impact of these rationally selfish behaviors on the performance of packet scheduling algorithms in time-slotted wireless networks. Using a mixed strategy game model, we show that the traditional maximum rate packet scheduling algorithm can cause non-cooperative devices to converge to highly inefficient Nash equilibria, in which the wireless channel resources are significantly wasted. By using a repeated game to enforce cooperation, we further propose a novel game theoretic algorithm that can lead to an efficient equilibrium. © 2010 Elsevier Inc. All rights reserved.postprin
40 Gbps Access for Metro networks: Implications in terms of Sustainability and Innovation from an LCA Perspective
In this work, the implications of new technologies, more specifically the new
optical FTTH technologies, are studied both from the functional and
non-functional perspectives. In particular, some direct impacts are listed in
the form of abandoning non-functional technologies, such as micro-registration,
which would be implicitly required for having a functioning operation before
arrival the new high-bandwidth access technologies. It is shown that such
abandonment of non-functional best practices, which are mainly at the
management level of ICT, immediately results in additional consumption and
environmental footprint, and also there is a chance that some other new
innovations might be 'missed.' Therefore, unconstrained deployment of these
access technologies is not aligned with a possible sustainable ICT picture,
except if they are regulated. An approach to pricing the best practices,
including both functional and non-functional technologies, is proposed in order
to develop a regulation and policy framework for a sustainable broadband
access.Comment: 10 pages, 6 Tables, 1 Figure. Accepted to be presented at the
ICT4S'15 Conferenc
- …