Back to Search Start Over

Reverse Engineering MAC

Authors :
Mung Chiang
Jang-Won Lee
Jianwei Huang
Ao Tang
A.R. Calderbank
Source :
WiOpt
Publication Year :
2006
Publisher :
IEEE, 2006.

Abstract

This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from the protocol description, through a stochastic subgradient method in which the link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. The minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of the best response strategy are established as a function of user density. Convergence properties and connection with the best response strategy are also proved for variants of the stochastic-subgradient-based dynamics of the game. Together with known results in reverse engineering TCP and BGP, this paper completes the recent efforts in reverse engineering the main protocols in layers 2-4.

Details

Database :
OpenAIRE
Journal :
2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
Accession number :
edsair.doi.dedup.....71b794b85f22ce1b7faff4714c50d79e
Full Text :
https://doi.org/10.1109/wiopt.2006.1666466