37 research outputs found

    Oligopolistic competition in heterogeneous access networks under asymmetries of cost and capacity

    Get PDF
    With the rapid development of broadband wireless access technologies, multiple wireless service provider (WSPs) operating on various wireless access technologies may coexist in one service area to compete for users, leading to a highly competitive environment for the WSPs. In such a competitive heterogeneous wireless access market, different wireless access technologies used by different WSPs have different bandwidth capacities with various costs. In this paper, we set up a noncooperative game model to study how the cost asymmetry and capacity asymmetry among WSPs affect the competition in this market. We first model such a competitive heterogeneous wireless access market as an oligopolistic price competition, in which multiple WSPs compete for a group of price- and delay-sensitive users through their prices, under cost and capacity asymmetries, to maximize their own profits. Then, we develop an analytical framework to investigate whether or not a Nash equilibrium can be achieved among the WSPs in the presence of the cost and capacity asymmetries, how the asymmetries of cost and capacity affect their equilibrium prices and what impact a new WSP with a cost and capacity advantage entering the market has on the equilibrium achieved among existing WSPs

    Game theory for cooperation in multi-access edge computing

    Get PDF
    Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.info:eu-repo/semantics/acceptedVersio

    Assessing the Network Neutrality Debate in the United States

    Get PDF
    Over the last decade in the United States network neutrality has evolved from a primarily technical concern to a national debate about the future of American communications regulation as well as technology and innovation policy in general. In October 2009 the U.S. Federal Communications Commission (FCC) issued a notice of proposed rulemaking (NPRM) to codify six principles of network neutrality. This proceeding which is unlikely to be completed before mid-2010 could have profound economic consequences for consumers content and applications providers and network operators.Network neutrality is a shorthand for a series of policy prescriptions that would restrict the ability of broadband internet service providers (ISPs) to manage network traffic. These restrictions include barring network operators from charging content and applications providers (as opposed to end users) for entering into business-to-business transactions for quality-of-service (QoS) enhancements for packet delivery. Although the initial objective for advocates of network neutrality regulation was to secure regulation of wireline networks the debate has expanded since its inception to include wireless networks

    Efficient Identification and Utilization of Spectrum Opportunities in Cognitive Radio Networks.

    Full text link
    There has been an exponential increase in spectrum demands due to new emerging wireless services and applications, making it harder to find unallocated spectrum bands for future usage. This potential resource scarcity is rooted at inefficient utilization of spectrum under static spectrum allocation. Therefore, a new concept of dynamic spectrum access (DSA) has been proposed to opportunistically utilize the legacy spectrum bands by cognitive radio (CR) users. Cognitive radio is a key technology for alleviating this inefficient spectrum utilization, since it can help discover spectrum opportunities (or whitespaces) in which legacy spectrum users do not temporarily use their assigned spectrum bands. In a DSA network, it is crucial to efficiently identify and utilize the whitespaces. We address this issue by considering spectrum sensing and resource allocation. Spectrum sensing is to discover spectrum opportunities and to protect the legacy users (or incumbents) against harmful interference from the CR users. In particular, sensing is an interaction between PHY and MAC layers where in the PHY-layer signal detection is performed, and in the MAC-layer spectrum sensing is scheduled and spectrum sensors are coordinated for collaborative sensing. Specifically, we propose an efficient MAC-layer sensing scheduling algorithm that discovers spectrum opportunities as much as possible for better quality-of-service (QoS), and as fast as possible for seamless service provisioning. In addition, we propose an optimal in-band spectrum sensing algorithm to protect incumbents by achieving the detectability requirements set by regulators (e.g., FCC) while incurring minimal sensing overhead. For better utilization of discovered spectrum opportunities, we pay our attention to resource allocation in the secondary spectrum market where legacy license holders temporarily lease their own spectrum to secondary wireless service providers (WSPs) for opportunistic spectrum access by CR users. In this setting, we investigate how a secondary WSP can maximize its profit by optimally controlling the admission and eviction of its customers (i.e., CR users). In addition, we also focus on the price and quality competition between co-located WSPs where they contend for enticing customers by providing more competitive service fee while leasing the channels with best matching quality.Ph.D.Electrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/78741/1/hyoilkim_1.pd

    Assessing the Network Neutrality Debate in the United States

    Get PDF
    Over the last decade in the United States network neutrality has evolved from a primarily technical concern to a national debate about the future of American communications regulation as well as technology and innovation policy in general. In October 2009 the U.S. Federal Communications Commission (FCC) issued a notice of proposed rulemaking (NPRM) to codify six principles of network neutrality. This proceeding which is unlikely to be completed before mid-2010 could have profound economic consequences for consumers content and applications providers and network operators.Network neutrality is a shorthand for a series of policy prescriptions that would restrict the ability of broadband internet service providers (ISPs) to manage network traffic. These restrictions include barring network operators from charging content and applications providers (as opposed to end users) for entering into business-to-business transactions for quality-of-service (QoS) enhancements for packet delivery. Although the initial objective for advocates of network neutrality regulation was to secure regulation of wireline networks the debate has expanded since its inception to include wireless networks

    Standardization of network interfaces : a framework for collaborative development and go-to-market strategy

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2006."June 2006."Includes bibliographical references.Over the last decade technological innovation in computers and communications industries has resulted in higher penetration of technology intensive products in businesses and homes. In communications industry, the true value of converged networks will be exploited only if the products and services provided end-to-end quality, reliability and consistency of features and functionalities that are offered. However, for this to happen, the products, systems and networks need to be interoperable. Interoperability can be accomplished most effectively and efficiently by use of common standards; but at the same time use of common standards potentially and arguably leads to commoditization of products, and constrains ability of product differentiation. Processes for setting standards, are not only messy but are prolonged, and quite often lead to battles for platform leadership. As incumbent telecommunications service providers transition from the public switched telephone networks to the IP-based data networks, customer expectations are high, challenges are many and failures are costly.(cont.) Verizon Interoperability Forum has taken on this challenge by attempting to develop standards for interfaces for network elements that are used on Verizon's own network. It is proposed that network interfaces' standards exhibit characteristics of network effects and possess a great potential for becoming a de facto standard.by Uday Hardikar.S.M

    Wireless networks for the developing world

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2004.Includes bibliographical references (p. 216-226).This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.As radio technologies and public policies evolve, an increasing amount of spectrum is being set aside for transmission use without a license. These license-exempt, or "unlicensed" bands, include 2.4 GHz and 5 GHz in the USA and much of Europe. I argue that this unlicensed spectrum, and low-cost wireless technologies that operate in these bands, is of particular value in the developing world, where it has the potential to substantially impact accessibility and availability of information and telecommunication services. In the context of numerous institutional and structural obstacles to entry license-exempt regulation potentially provides a friendly environment for entrepreneurship, reducing barriers to entry and the risk of regulatory capture. In order to assess this opportunity in the context of Africa, I have surveyed every country in the continent on their regulations and use of the 2.4 and 5 GHz bands. Responses, from differing country informants though mostly from the regulators themselves, were received from 47 of the 54 countries of Africa, which accounts for 95% of the continent's population. The responses show that there is significant diversity and heterogeneity in the regulation of these bands across Africa. Not only do licensing requirements and specific conditions change widely from country to country, but so do power, range and services restrictions, as well as certification requirements. In addition, regulation is still not in place in some countries, and is changing in others. Enforcement is low, adding to overall uncertainty. Lack of clarity in regulation and enforcement creates confusion and may discourage smaller players from entering the market. For bigger players interested in taking advantage of economies of scale(cont.) and implementing common strategies across borders, the heterogeneous regulatory environment will also act as a deterrent and a barrier to entry. Despite this heterogeneity, these bands are being used in most African countries, not only for "hotspot" style or other localized coverage in urban areas, but also for longer area coverage. A significant 37% of the countries that responded are using wireless technologies operating in these bands for providing backhaul network connectivity in rural areas. In unlicensed bands regulation tends to place a burden on the transmitter though, e.g. through power restrictions, in particular where competition in the market is low. In view of the continent's weak teledensity and lack of alternative infrastructure, establishing a more certain and uniform regulatory framework and promoting an appropriate business climate across Africa may be instrumental in encouraging private investment and connectivity through technology in these bands. The TU may have a key role to play, both by issuing clearer guidelines for the regulation of license-exempt bands, and by serving as a convening forum for countries to establish common regulatory strategies. While a fair balance is needed in regulation, this thesis argues that governments should err on the side of laxity in order to lower barriers to entry and counterbalance current overregulation of these bands.by Maria Isabel A.S. Neto.S.M

    Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends

    Get PDF
    Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios
    corecore