IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016
DOI: 10.1109/infocom.2016.7524516
|View full text |Cite
|
Sign up to set email alerts
|

Interference-aware time-based fairness for multihop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…The practical significance of stochastic asymmetric Blotto games is paramount for evolving the decision-making logic of next-generation communication systems by shifting from centrally-imposed to distributed-competitive notions of fairness, where the term "users" (players) can expand from mobile users to complete campus-wide networks, service providers, smart verticals, or even virtual network functions (VNFs), network nodes, etc., and wireless services (contests) can draw on enhanced Mobile BroadBand (eMBB) profiles with transformational Ultra Reliable Low Latency Communications (URLLC) and massive Machine Type Communications (mMTC) applications (3GPP Releases 15 & 16). For example, stochastic asymmetric Blotto game logic can jointly integrate eMBB, URLLC and mMTC services into single multi-network profile when applied on, e.g., (i) cognitive radios (CRs) by enabling unlicensed mobile users to simultaneously compete for spare licensed carriers in both good and bad channel conditions, which ensures that no resources are wasted [6]- [7], (ii) mobile ad-hoc networks (MANETs) by deliberating both best-effort and poorly-treated nodes, which maximises the number of active routes and, thus, device connectivity [8], (iii) software-defined networking (SDN) by hierarchising the coexisting network nodes according to their instantaneous capacity, which helps to self-configure the traffic load balancing rules in runtime [9]- [10], (iv) multi-hop networks by distributing hops that are close as well as away from the gateways, which maximises the number of data flows and, thus, the network throughput overall [11], (v) Fog computing by anticipating the benefit of each Edge-Cloud device considering both free and congested computation/storage resources [12], (vi) network sharing by enabling multiple mobile operators with their networks deployed in the same area to collaborate and maximise instantaneous service-critical requests, while competing to improve their profits [13]- [14], and so on.…”
Section: Introductionmentioning
confidence: 99%
“…The practical significance of stochastic asymmetric Blotto games is paramount for evolving the decision-making logic of next-generation communication systems by shifting from centrally-imposed to distributed-competitive notions of fairness, where the term "users" (players) can expand from mobile users to complete campus-wide networks, service providers, smart verticals, or even virtual network functions (VNFs), network nodes, etc., and wireless services (contests) can draw on enhanced Mobile BroadBand (eMBB) profiles with transformational Ultra Reliable Low Latency Communications (URLLC) and massive Machine Type Communications (mMTC) applications (3GPP Releases 15 & 16). For example, stochastic asymmetric Blotto game logic can jointly integrate eMBB, URLLC and mMTC services into single multi-network profile when applied on, e.g., (i) cognitive radios (CRs) by enabling unlicensed mobile users to simultaneously compete for spare licensed carriers in both good and bad channel conditions, which ensures that no resources are wasted [6]- [7], (ii) mobile ad-hoc networks (MANETs) by deliberating both best-effort and poorly-treated nodes, which maximises the number of active routes and, thus, device connectivity [8], (iii) software-defined networking (SDN) by hierarchising the coexisting network nodes according to their instantaneous capacity, which helps to self-configure the traffic load balancing rules in runtime [9]- [10], (iv) multi-hop networks by distributing hops that are close as well as away from the gateways, which maximises the number of data flows and, thus, the network throughput overall [11], (v) Fog computing by anticipating the benefit of each Edge-Cloud device considering both free and congested computation/storage resources [12], (vi) network sharing by enabling multiple mobile operators with their networks deployed in the same area to collaborate and maximise instantaneous service-critical requests, while competing to improve their profits [13]- [14], and so on.…”
Section: Introductionmentioning
confidence: 99%