IEEE INFOCOM 2008 - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2008.144
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach

Abstract: Abstract-We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosing the transmission rate at which VoIP traffic is received. We denote this adaptation process by end-user congestion control, our object of study. The two questions that we ask are: (1) what are the performance consequences of letting the users to freely choose their rates? and (2) how to explain the adaptation process of the u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…(where 2L = N (N −1)). (The equality for other regular graphs is ruled out because of the inequality in (9).) Using (9) into (8) yields…”
Section: Virus Spread-performance-cost (Vspc) Gamementioning
confidence: 99%
See 1 more Smart Citation
“…(where 2L = N (N −1)). (The equality for other regular graphs is ruled out because of the inequality in (9).) Using (9) into (8) yields…”
Section: Virus Spread-performance-cost (Vspc) Gamementioning
confidence: 99%
“…In practice, hosts often are autonomous, act independently and do not coordinate as in P2P networks [2], peering relations between Autonomous Systems [3], overlay networks [4], wireless [5], [6], [7] and mobile [8] networks, resource sharing in VoIP networks [9], social networks [10], [11] or the Internet [12]. Their aim is to optimize their own utility functions, which are not necessarily in accordance to the global optimum.…”
Section: Introductionmentioning
confidence: 99%
“…In [5], authors modeled a competition between users for one access point as an evolutionary game. Users represent players that compete to maximize the transmission rate.…”
Section: Game Between Usersmentioning
confidence: 99%
“…NS in a heterogeneous environment can be described as a multiple attribute decision making (MADM) problem, because of the number of parameters and criteria involved [1]- [4]. Other methods, such as fuzzy logic, game theory and utility functions have been proposed to solve the NS problem in [5], [6] and will be surveyed in this paper. Other methods pertaining to multi-criteria optimization have been used to deal with the NS problem as well.…”
Section: Introductionmentioning
confidence: 99%
“…Evolutionary game theory (EGT) is originated from the study of ecological biology [18], which differs from the classical game theory by emphasizing more on the dynamics and stability of the whole population's strategies [19], instead of only the property of the equilibrium. EGT has been widely used to model users' behaviors in image processing [20], as well as communication and networking area [21] [22], such as congestion control [23], cooperative sensing [24], cooperative peer-to-peer (P2P) streaming [25] and dynamic spectrum access [26]. In these literatures, evolutionary game has been shown to be an effective approach to model the dynamic social interactions among users in a network.…”
Section: A Introduction Of Graphical Evolutionary Gamementioning
confidence: 99%