44 research outputs found
Cognitive MAC Protocols Using Memory for Distributed Spectrum Sharing Under Limited Spectrum Sensing
The main challenges of cognitive radio include spectrum sensing at the
physical (PHY) layer to detect the activity of primary users and spectrum
sharing at the medium access control (MAC) layer to coordinate access among
coexisting secondary users. In this paper, we consider a cognitive radio
network in which a primary user shares a channel with secondary users that
cannot distinguish the signals of the primary user from those of a secondary
user. We propose a class of distributed cognitive MAC protocols to achieve
efficient spectrum sharing among the secondary users while protecting the
primary user from potential interference by the secondary users. By using a MAC
protocol with one-slot memory, we can obtain high channel utilization by the
secondary users while limiting interference to the primary user at a low level.
The results of this paper suggest the possibility of utilizing MAC design in
cognitive radio networks to overcome limitations in spectrum sensing at the PHY
layer as well as to achieve spectrum sharing at the MAC layer.Comment: 24 pages, 7 figure
A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer-to-Peer Networks
User-generated content can be distributed at a low cost using peer-to-peer
(P2P) networks, but the free-rider problem hinders the utilization of P2P
networks. In order to achieve an efficient use of P2P networks, we investigate
fundamental issues on incentives in content production and sharing using game
theory. We build a basic model to analyze non-cooperative outcomes without an
incentive scheme and then use different game formulations derived from the
basic model to examine five incentive schemes: cooperative, payment, repeated
interaction, intervention, and enforced full sharing. The results of this paper
show that 1) cooperative peers share all produced content while non-cooperative
peers do not share at all without an incentive scheme; 2) a cooperative scheme
allows peers to consume more content than non-cooperative outcomes do; 3) a
cooperative outcome can be achieved among non-cooperative peers by introducing
an incentive scheme based on payment, repeated interaction, or intervention;
and 4) enforced full sharing has ambiguous welfare effects on peers. In
addition to describing the solutions of different formulations, we discuss
enforcement and informational requirements to implement each solution, aiming
to offer a guideline for protocol designers when designing incentive schemes
for P2P networks.Comment: 31 pages, 3 figures, 1 tabl
Adaptive MAC Protocols Using Memory for Networks with Critical Traffic
We consider wireless communication networks where network users are subject
to critical events such as emergencies and crises. If a critical event occurs
to a user, the user needs to send critical traffic as early as possible.
However, most existing medium access control (MAC) protocols are not adequate
to meet the urgent need for data transmission by users with critical traffic.
In this paper, we devise a class of distributed MAC protocols that achieve
coordination using the finite-length memory of users containing their own
observations and traffic types. We formulate a protocol design problem and find
optimal protocols that solve the problem. We show that the proposed protocols
enable a user with critical traffic to transmit its critical traffic without
interruption from other users after a short delay while allowing users to share
the channel efficiently when there is no critical traffic. Moreover, the
proposed protocols require short memory and can be implemented without explicit
message passing.Comment: 24 pages, 7 figures, 1 tabl
Designing Incentive Schemes Based on Intervention: The Case of Imperfect Monitoring
We propose an incentive scheme based on intervention to sustain cooperation
among self-interested users. In the proposed scheme, an intervention device
collects imperfect signals about the actions of the users for a test period,
and then chooses the level of intervention that degrades the performance of the
network for the remaining time period. We analyze the problems of designing an
optimal intervention rule given a test period and choosing an optimal length of
the test period. The intervention device can provide the incentive for
cooperation by exerting intervention following signals that involve a high
likelihood of deviation. Increasing the length of the test period has two
counteracting effects on the performance: It improves the quality of signals,
but at the same time it weakens the incentive for cooperation due to increased
delay.Comment: 8 pages, 1 figur
Intervention in Power Control Games With Selfish Users
We study the power control problem in wireless ad hoc networks with selfish
users. Without incentive schemes, selfish users tend to transmit at their
maximum power levels, causing significant interference to each other. In this
paper, we study a class of incentive schemes based on intervention to induce
selfish users to transmit at desired power levels. An intervention scheme can
be implemented by introducing an intervention device that can monitor the power
levels of users and then transmit power to cause interference to users. We
mainly consider first-order intervention rules based on individual transmit
powers. We derive conditions on design parameters and the intervention
capability to achieve a desired outcome as a (unique) Nash equilibrium and
propose a dynamic adjustment process that the designer can use to guide users
and the intervention device to the desired outcome. The effect of using
intervention rules based on aggregate receive power is also analyzed. Our
results show that with perfect monitoring intervention schemes can be designed
to achieve any positive power profile while using interference from the
intervention device only as a threat. We also analyze the case of imperfect
monitoring and show that a performance loss can occur. Lastly, simulation
results are presented to illustrate the performance improvement from using
intervention rules and compare the performances of different intervention
rules.Comment: 33 pages, 6 figure
Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks
Distributed medium access control (MAC) protocols are essential for the
proliferation of low cost, decentralized wireless local area networks (WLANs).
Most MAC protocols are designed with the presumption that nodes comply with
prescribed rules. However, selfish nodes have natural motives to manipulate
protocols in order to improve their own performance. This often degrades the
performance of other nodes as well as that of the overall system. In this work,
we propose a class of protocols that limit the performance gain which nodes can
obtain through selfish manipulation while incurring only a small efficiency
loss. The proposed protocols are based on the idea of a review strategy, with
which nodes collect signals about the actions of other nodes over a period of
time, use a statistical test to infer whether or not other nodes are following
the prescribed protocol, and trigger a punishment if a departure from the
protocol is perceived. We consider the cases of private and public signals and
provide analytical and numerical results to demonstrate the properties of the
proposed protocols.Comment: 14 double-column pages, submitted to ACM/IEEE Trans Networkin
Medium Access Control Protocols With Memory
Many existing medium access control (MAC) protocols utilize past information
(e.g., the results of transmission attempts) to adjust the transmission
parameters of users. This paper provides a general framework to express and
evaluate distributed MAC protocols utilizing a finite length of memory for a
given form of feedback information. We define protocols with memory in the
context of a slotted random access network with saturated arrivals. We
introduce two performance metrics, throughput and average delay, and formulate
the problem of finding an optimal protocol. We first show that a TDMA outcome,
which is the best outcome in the considered scenario, can be obtained after a
transient period by a protocol with (N-1)-slot memory, where N is the total
number of users. Next, we analyze the performance of protocols with 1-slot
memory using a Markov chain and numerical methods. Protocols with 1-slot memory
can achieve throughput arbitrarily close to 1 (i.e., 100% channel utilization)
at the expense of large average delay, by correlating successful users in two
consecutive slots. Finally, we apply our framework to wireless local area
networks.Comment: 32 pages, 7 figures, 2 table