Reverse engineering MAC

Ao Tang, Jang Won Lee, Jianwei Huang, Mung Chiang, A. Robert Calderbank

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.

Original languageEnglish
Title of host publication2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006 - Boston, MA, United States
Duration: 2006 Feb 262006 Mar 2

Publication series

Name2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

Other

Other2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
CountryUnited States
CityBoston, MA
Period06/2/2606/3/2

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Modelling and Simulation

Cite this

Tang, A., Lee, J. W., Huang, J., Chiang, M., & Calderbank, A. R. (2006). Reverse engineering MAC. In 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006 [1666466] (2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006). https://doi.org/10.1109/WIOPT.2006.1666466