Computer Science ›› 2016, Vol. 43 ›› Issue (9): 146-151, 164.doi: 10.11896/j.issn.1002-137X.2016.09.028

Previous Articles     Next Articles

Evolutionary Game Theory-based Access Control Study for P-persistent CSMA Networks

WANG Le, MAO Jian-lin, ZHU Hao-fu and GUO Ning   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Considering the noncooperation system behavior of p-persistent CSMA network where the wireless channel error may occur,this paper established a p-persistent CSMA evolutionary game model (EGP-CSMA).In this model,the unique evolutionary stable strategy (ESS) is derived and the optimal ESS to maximize saturation throughput and minimize average energy consumption are calculated respectively.Then,the effect of payoff delay,success payoff and bit error rate are studied on the convergence of evolutionary dynamics to the optimal ESS.Numerical simulation results show that,as the bit error rate is constant and the payoff delay is short,a proper cost and payoff can make the multiple access game reach an evolutionary stable status at the optimal transmission probability.Thus,the p-persistent CSMA network can be stable and perform optimally.

Key words: Evolutionary game theory,P-persistent CSMA,Access control,Evolutionary stable strategy,Replicator dynamics

[1] Kleinrock L,Tobagi F A.Packet switching in radio channels:part I- carrier sense multiple access modes and their throughput-delay characteristics[J].IEEE Transactions on Communications,1975,23(12):1400-1416
[2] Cali F,Conti M,Gregori E.Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit[J].IEEE/ACM Transactions on Networking,2000,8(6):785-799
[3] Bruno R,Conti M,et al.Optimization of Efficiency and Energy Consumption in p-Persistent CSMA-Based Wireless LANs[J].IEEE Transactions on Mobile Computing,2002,1(1):10-31
[4] Bianchi G.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communictions,2000,18(3):535-547
[5] Yedavalli K,Krishnamachari B.Enhancement of the 802.4MAC Protocol for Scalable Data Collection in Dense Sensor Networks[C]∥Proc.6th Int.Symp.Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks (WiOPT’08).Berlin,Germany,2008:152-161
[6] Marden J R,Shamma J S.Chapter 16-Game Theory and Distribu-ted Control[M]∥Handbook of Game Theory with Economic Applications.Volume 4,5:861-899
[7] Boulogne N,Altman E,Kameda H,et al.An Evolutionary Game Perspective to ALOHA with Power Control[C]∥19th International Teletraffic Congress.Beijing,China,2005
[8] Tembine H,Altman E,El-Azouzi R.Delayed evolutionary game dynamics applied to the medium access control[C]∥Proc.IEEE MASS.Bionetworks,2007:1-6
[9] Tembine H,Altman E,El-Azouzi R,et al.Multiple access game in ad-hoc network[C]∥ACM Proc.ValueTools.Nantes,France,2007,321
[10] Tembine H,Altman E,El-Azouzi R,et al.Evolutionary games with random number of interacting players applied to access control[C]∥Proc.IEEE/ACM WiOpt.2008:344-351
[11] Tembine H,Altman E,El-Azouzi R,et al.Evolutionary games in wireless networks[J].IEEE Transactions on Systems,Man,and Cybernetics-Part B:Cybernetics,2010,40(3):634-646
[12] 威布尔.演化博弈论[M].王永钦.上海:上海人民出版社,2006
[13] Cheng Yan-hong,Li Zhi-shu,Chen Liang-yin.An Adaptive MACProtocol for Wireless LANs Under Error-Prone Environment[J].Computer Research and Development,2012,49(1):174-182(in Chinese) 程艳红,李志蜀,陈良银.差错信道下无线局域网的自适应MAC协议[J].计算机研究与发展,2012,9(1):174-182
[14] Cheng Yuan,Zhang Yuan,Gao Xi-qi.Performance analysis of packet dropping probability under error-prone channel in WLAN[J].Journal on Communications,2007,28(5):126-131(in Chinese) 程远,张源,高西奇.差错信道下无线局域网丢包率性能分析[J].通信学报,2007,8(5):126-131

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .