A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Opportunistic Scheduling Algorithms for Wireless Networks
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Peter Bulychev Alexandre David Kim G. Larsen Marius Mikucionis TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A.
Center for Wireless COMMUNICATIONS 5/24/2015 Energy Efficient Networking Ramesh R. Rao University of California, San Diego - NeXtworking’03 - Chania, Crete,
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
1 ENERGY: THE ROOT OF ALL PERVASIVENESS Anthony Ephremides University of Maryland April 29, 2004.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Slotted Nonpersistent CSMA Timeline divided into time slots, called mini slot, with length equal to maximum propagation delay  Before attempting transmission,
7C Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access.
Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
September 19-20, 2005© SEIL Progress Summary “Dawn” MURI Review Anthony Ephremides University of Maryland Santa Cruz, CA September 12, 2006.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
A Lyapunov Optimization Approach to Repeated Stochastic Games Michael J. Neely University of Southern California Proc.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Chap 4 Multiaccess Communication (Part 1)
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
Vaggelis G. Douros Stavros Toumpis George C. Polyzos On the Nash Equilibria of Graphical Games for Channel Access in Multihop Wireless Networks 1 WWRF-WCNC.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 3 Application Metrics and Network Performance Asu Ozdaglar and Devavrat.
Wen-Hwa Liao, Wen-Chin Chung Tatung University, Taiwan CMC2009 (International Conference on Communications and Mobile Computing)
PRICE-BASED SPECTRUM MANAGEMENT IN COGNITIVE RADIO NETWORKS Fan Wang, Marwan Krunz, and Shuguang Cui Department of Electrical & Computer Engineering, University.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
CDMA Based MAC Protocol for Wireless Ad Hoc Networks Alaa Mouquatash & Marwan Krunz Presentation by: Moheeb Abu-Rajab.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Reverse-Engineering MAC: A non-cooperative game model
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
SENSYS Presented by Cheolki Lee
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Javad Ghaderi, Tianxiong Ji and R. Srikant
<month year> <doc.: IEEE doc> January 2013
of the IEEE Distributed Coordination Function
The System Issues of Rate Adaptation
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze a cross-layering problem in wireless ad hoc networks from the perspective of stochastic games – Simple building block:Multi-Access Channel – Joint Random Access & Power and Rate Control (MAC Layer) (Physical Layer) Motivation: Wireless ad hoc networks consist of selfish (non-cooperative) nodes with conflicting interests: – Intertwined conflicts of throughput, energy and delay – Selfish behavior prevents cheating for channel access – Inherently distributed and scalable Expected Utilities for Random Access Game transmitting waiting K i,n :number of transmitting nodes other than node i for state n Random Access as a Stochastic Game Single-cell system with classical uplink collision channel – Multiple blocked nodes contending for single channel Game with two actions : Transmitting or Waiting Performance measures : (a) throughput reward 1 for successful transmissions (b) energy cost c for transmission attempts (c) discount future payoffs by  for each slot of delay State of Game : n (number of backlogged nodes) Given n, each user i selects transmitting probability p i,n (a) independently to maximize individual utility u i,n (b) cooperatively to maximize total system utility U n Slotted collision channel model: – Each packet arrives at a “new ” transmitter node – No new packet arrives until resolution of backlogged nodes Capture: Multiple successful transmissions per slot – Capture probability q k : Probability that any transmitting node i is successful for total of k +1 transmitting nodes Error-free feedback: (I) Channel Outputs: Success, Collision, Idle (II) State of the Game n Symmetric Random Access Games G (n) Conflicting nodes are identical  Symmetric Game – Users have the same strategies for the same game state n Physical layer-based (symmetric) capture model : – Success based on signal-to-interference-plus-noise-ratios Power Control and Rate Adaptation Game PRG (n) Capture mechanism depends on powers & rates of nodes Given n, node i selects power-rate pair S j  J = E x R – E j or R j :Transmission power or rate of action S j, 1  j  |J | – ER i,n (S j ) : Prob. that node i chooses action S j for state n – Strategy : Given state n, any node i selects ER i,n (S j ) to maximize its own utility – Energy cost : c E j, if R j > 0 – Reward for successful transmission : R j M-ary Quadrature Amplitude Modulation as rate control – Selecting transmission rate R bits per slot  Employing m-ary QAM, (m = 2 R ) or waiting (m = 1) Symmetric Nash Equilibrium for identical nodes: – For n  1, find ER n (S j )*, S j  J, such that given u* n-k, n-1  k  1 Superior Performance of Power and Rate Control Games Non-cooperative Eq. strategies of power & rate control – Power Set E = {0,1,2,3,4,5} unit power – Rate Set R = {0,1,2,3,4} (bits/packet)  2, 4, 8, 16-QAM Non-Cooperative Eq. strategies for random access G(n) – Each user decides only to transmit or wait – Averaged or optimized over possible powers and rates * The material presented in this poster is based on paper “Power Control and Rate Adaptation as Stochastic Games for Random Access”, Yalin Evren Sagduyu, Anthony Ephremides, in Proc. IEEE Control and Decision Conference, Dec P i = P : power of user i,  2 : Gaussian noise power, L: Processing gain, L > 1 if CDMA used Equilibrium Strategies for Random Access Games Non-cooperative Nash Eq. : Cooperative Eq. : Cooperation is better than selfish decisions: Expected Utilities as function of n