TY - GEN
T1 - Reverse engineering MAC
AU - Tang, Ao
AU - Lee, Jang Won
AU - Huang, Jianwei
AU - Chiang, Mung
AU - Calderbank, A. Robert
PY - 2006
Y1 - 2006
N2 - This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.
AB - This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.
KW - Ad hoc network
KW - Game theory
KW - Mathematical programming/optimization
KW - Medium access control
KW - Network control by pricing
KW - Network utility maximization
KW - Reverse engineering
KW - Wireless network
UR - http://www.scopus.com/inward/record.url?scp=84886571225&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84886571225&partnerID=8YFLogxK
U2 - 10.1109/WIOPT.2006.1666466
DO - 10.1109/WIOPT.2006.1666466
M3 - Conference contribution
AN - SCOPUS:84886571225
SN - 0780395492
SN - 9780780395497
T3 - 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
BT - 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
T2 - 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
Y2 - 26 February 2006 through 2 March 2006
ER -