计算机科学 ›› 2016, Vol. 43 ›› Issue (9): 146-151, 164.doi: 10.11896/j.issn.1002-137X.2016.09.028

• 网络与通信 • 上一篇    下一篇

基于演化博弈论的p-坚持CSMA网络接入控制研究

王乐,毛剑琳,诸浩富,郭宁   

  1. 昆明理工大学信息工程与自动化学院 昆明650500,昆明理工大学信息工程与自动化学院 昆明650500,昆明理工大学信息工程与自动化学院 昆明650500,昆明理工大学信息工程与自动化学院 昆明650500
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61163051)资助

Evolutionary Game Theory-based Access Control Study for P-persistent CSMA Networks

WANG Le, MAO Jian-lin, ZHU Hao-fu and GUO Ning   

  • Online:2018-12-01 Published:2018-12-01

摘要: 考虑到存在无线信道差错,针对p-坚持CSMA网络的非合作系统行为,建立了p-坚持CSMA演化博弈模型,推导了唯一的演化稳定策略,以饱和吞吐量最大、平均能耗最小为目标求解了最优演化稳定策略。然后,进一步研究了收益时延、成功收益以及比特差错概率对最优演化稳定过程的影响。数值仿真结果表明,当比特差错概率一定、收益时延较小时,选择合适的成本和收益,使多路访问博弈在最优传输概率处演化稳定,可获得一个稳定且性能最优的p-坚持CSMA网络。

关键词: 演化博弈论,p-坚持CSMA网络,接入控制,演化稳定策略,复制子动态

Abstract: Considering the noncooperation system behavior of p-persistent CSMA network where the wireless channel error may occur,this paper established a p-persistent CSMA evolutionary game model (EGP-CSMA).In this model,the unique evolutionary stable strategy (ESS) is derived and the optimal ESS to maximize saturation throughput and minimize average energy consumption are calculated respectively.Then,the effect of payoff delay,success payoff and bit error rate are studied on the convergence of evolutionary dynamics to the optimal ESS.Numerical simulation results show that,as the bit error rate is constant and the payoff delay is short,a proper cost and payoff can make the multiple access game reach an evolutionary stable status at the optimal transmission probability.Thus,the p-persistent CSMA network can be stable and perform optimally.

Key words: Evolutionary game theory,P-persistent CSMA,Access control,Evolutionary stable strategy,Replicator dynamics

[1] Kleinrock L,Tobagi F A.Packet switching in radio channels:part I- carrier sense multiple access modes and their throughput-delay characteristics[J].IEEE Transactions on Communications,1975,23(12):1400-1416
[2] Cali F,Conti M,Gregori E.Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit[J].IEEE/ACM Transactions on Networking,2000,8(6):785-799
[3] Bruno R,Conti M,et al.Optimization of Efficiency and Energy Consumption in p-Persistent CSMA-Based Wireless LANs[J].IEEE Transactions on Mobile Computing,2002,1(1):10-31
[4] Bianchi G.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communictions,2000,18(3):535-547
[5] Yedavalli K,Krishnamachari B.Enhancement of the 802.4MAC Protocol for Scalable Data Collection in Dense Sensor Networks[C]∥Proc.6th Int.Symp.Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks (WiOPT’08).Berlin,Germany,2008:152-161
[6] Marden J R,Shamma J S.Chapter 16-Game Theory and Distribu-ted Control[M]∥Handbook of Game Theory with Economic Applications.Volume 4,5:861-899
[7] Boulogne N,Altman E,Kameda H,et al.An Evolutionary Game Perspective to ALOHA with Power Control[C]∥19th International Teletraffic Congress.Beijing,China,2005
[8] Tembine H,Altman E,El-Azouzi R.Delayed evolutionary game dynamics applied to the medium access control[C]∥Proc.IEEE MASS.Bionetworks,2007:1-6
[9] Tembine H,Altman E,El-Azouzi R,et al.Multiple access game in ad-hoc network[C]∥ACM Proc.ValueTools.Nantes,France,2007,321
[10] Tembine H,Altman E,El-Azouzi R,et al.Evolutionary games with random number of interacting players applied to access control[C]∥Proc.IEEE/ACM WiOpt.2008:344-351
[11] Tembine H,Altman E,El-Azouzi R,et al.Evolutionary games in wireless networks[J].IEEE Transactions on Systems,Man,and Cybernetics-Part B:Cybernetics,2010,40(3):634-646
[12] 威布尔.演化博弈论[M].王永钦.上海:上海人民出版社,2006
[13] Cheng Yan-hong,Li Zhi-shu,Chen Liang-yin.An Adaptive MACProtocol for Wireless LANs Under Error-Prone Environment[J].Computer Research and Development,2012,49(1):174-182(in Chinese) 程艳红,李志蜀,陈良银.差错信道下无线局域网的自适应MAC协议[J].计算机研究与发展,2012,9(1):174-182
[14] Cheng Yuan,Zhang Yuan,Gao Xi-qi.Performance analysis of packet dropping probability under error-prone channel in WLAN[J].Journal on Communications,2007,28(5):126-131(in Chinese) 程远,张源,高西奇.差错信道下无线局域网丢包率性能分析[J].通信学报,2007,8(5):126-131

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75, 88 .
[2] 夏庆勋,庄毅. 一种基于局部性原理的远程验证机制[J]. 计算机科学, 2018, 45(4): 148 -151, 162 .
[3] 厉柏伸,李领治,孙涌,朱艳琴. 基于伪梯度提升决策树的内网防御算法[J]. 计算机科学, 2018, 45(4): 157 -162 .
[4] 王欢,张云峰,张艳. 一种基于CFDs规则的修复序列快速判定方法[J]. 计算机科学, 2018, 45(3): 311 -316 .
[5] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[6] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[7] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[8] 刘琴. 计算机取证过程中基于约束的数据质量问题研究[J]. 计算机科学, 2018, 45(4): 169 -172 .
[9] 钟菲,杨斌. 基于主成分分析网络的车牌检测方法[J]. 计算机科学, 2018, 45(3): 268 -273 .
[10] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99, 116 .