Reverse-Engineering MAC: A non-cooperative game model

Slides:



Advertisements
Similar presentations
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Advertisements

MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
College of Engineering Optimal Access Point Selection and Channel Assignment in IEEE Networks Sangtae Park Advisor: Dr. Robert Akl Department of.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Convergence Time to Nash Equilibria in Load Balancing Eyal Even-Dar, Tel-Aviv University Alex Kesselman, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
Binary Exponential Backoff Binary exponential backoff refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
: Data Communication and Computer Networks
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
1 Multi-radio Channel Allocation in Competitive Wireless Networks Mark Felegyhazi, Mario Čagalj, Jean-Pierre Hubaux EPFL, Switzerland IBC’06, Lisbon, Portugal.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 12 Multiple Access
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Chapter 12 Multiple Access.
Medium Access Control MAC protocols: design goals, challenges,
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Chapter 12 Multiple Access
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Cross layer design is wireless multi-hop network
Net301 lecture9 11/5/2015 Lect 9 NET301.
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
COT 5611 Operating Systems Design Principles Spring 2014
Author: Giuseppe Bianchi
Chapter 13 Multiple Access
The Impact of Multihop Wireless Channel on TCP Performance
Chapter 13 Multiple Access
The System Issues of Rate Adaptation
CARRIER SENSE MULTIPLE ACCESS (CSMA)
COT 5611 Operating Systems Design Principles Spring 2012
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Reverse-Engineering MAC: A non-cooperative game model Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang, A. Robert Calderbank IEEE JSAC, 2007

Reverse engineering Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. In this paper, by studying the current MAC protocol, they discover that the users are actually implicitly participating a non-cooperative game, with the utility function of each selfish user - a mathematical model to study the selfish behaviors in the current MAC protocol - much insights on protocol performance

Reverse engineering In protocol layers - Layer 4: TCP/AQM - Layer 3: BGP - Layer 2: MAC MAC protocols - scheduling-based (contention free): FDMA, TDMA, CDMA - random access (contention-based): Ethernet, slotted Aloha, 802.11 DCF function >> Exponential Backoff (EB) protocol

TCP/AQM reverse engineering Cooperative Network Utility Maximization (NUM) - utility of each user depends on its own data rate, which can be directly controlled by user itself - feedback from network

EB protocol reverse engineering The utility of each link in the EB protocol directly depends on not just its own transmission but also transmissions of other links due to collisions - cannot be controlled by the link itself There is no explicit feedback from the network Hence, in contrast to TCP reverse engineering, a non- cooperative game model is more appropriate for the EB protocol than a global optimization model

System model EB protocol - contention-window-based protocol - persistence-probability-based protocol >> each link l has its own persistence probability pl and the maximum and minimum persistence probabilities plmax and plmin >> if transmission is successful, pl= plmax >> Otherwise, , where >> if , it is called the Binary Exponential Backoff (BEB) protocol

Persistence probability update - 1a is an indicator function of event a - Tl(t) is the event that link l transmits data at time-slot t - Cl(t) is the event that there is a collision to link l’s transmission given that link l transmits data at time-slot t

EB-MAC game The update algorithm for expected persistence probability

EB-MAC game They reverse-engineer the update algorithm in (3) as a game, in which each link l updated its persistence probability pl, to maximize its utility Ul based on strategies of the other links , where - E is a set of links - Al={pl| plmin≤ pl ≤ plmax} is an action set of link l - Ul is a utility function of link l

EB-MAC game

EB protocol and stochastic subgradient method

Best response

Numerical results

Numerical results

Conclusion Reverse-engineered exponential-backoff random access protocols as a non-cooperative game model Each link is implicitly maximizing a utility function in the form of net reward for successful transmission Due to the lack of proper feedback mechanisms in the current EB protocols, such selfish, local actions are not aligned to maximize the network-wide total utility, nor are they guaranteed to converge, even though a Nash equilibrium for the MAC game always exists