Back to Search
Start Over
Reverse Engineering MAC
- Source :
- WiOpt
- Publication Year :
- 2006
- Publisher :
- IEEE, 2006.
-
Abstract
- This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from the protocol description, through a stochastic subgradient method in which the link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. The minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of the best response strategy are established as a function of user density. Convergence properties and connection with the best response strategy are also proved for variants of the stochastic-subgradient-based dynamics of the game. Together with known results in reverse engineering TCP and BGP, this paper completes the recent efforts in reverse engineering the main protocols in layers 2-4.
- Subjects :
- Reverse engineering
business.industry
Computer science
Wireless ad hoc network
media_common.quotation_subject
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
computer.software_genre
symbols.namesake
Nash equilibrium
Best response
Convergence (routing)
Computer Science::Networking and Internet Architecture
symbols
business
Function (engineering)
computer
Game theory
Subgradient method
Computer network
media_common
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
- Accession number :
- edsair.doi.dedup.....71b794b85f22ce1b7faff4714c50d79e
- Full Text :
- https://doi.org/10.1109/wiopt.2006.1666466