Fair bandwidth sharing in distributed systems: A game-theoretic approach

被引:10
作者
Rakshit, S [1 ]
Guha, RK [1 ]
机构
[1] Univ Cent Florida, Sch Comp Sci, Orlando, FL 32816 USA
基金
美国国家科学基金会;
关键词
distributed systems; local area networks; fair bandwidth share; selfish users; game theory;
D O I
10.1109/TC.2005.183
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fair sharing of bandwidth remains an unresolved issue for distributed systems. In this paper, the users of a distributed LAN are modeled as selfish users with independence to choose their individual strategies. With these selfish users, the contention-based distributed medium access scenario is modeled as a complete-information, noncooperative game, designated the "Access Game." A novel MAC strategy based on p-persistent CSMA is presented to achieve fairness in the "Access Game." It is proven that there are an infinite number of Nash Equilibria for the "Access Game," but they do not result in fairness. Therefore, it may be beneficial for the selfish users to adhere to a set of constraints that result in fairness in a noncooperative fashion. This leads to the formulation of a constrained " Access Game" with fairness represented as a set of algebraic constraints. It is proven that the solution of the constrained game, the Constrained Nash Equilibrium, is unique. Further, it is shown that, in addition to achieving fairness, this solution also optimizes the throughput. Finally, these results are extended to a more realistic incomplete-information scenario by approximating the incomplete-information scenario as a complete-information scenario through information gathering and dissemination.
引用
收藏
页码:1384 / 1393
页数:10
相关论文
共 44 条
[1]  
Abramson N., 1970, Proceedings of the 1970 fall joint computer conference, P281, DOI 10.1145/1478462.1478502
[2]  
AKELLA A, 2002, P SIGCOMM 02 AUG
[3]  
BENNET J, 1996, P IEEE INFOCOM 96 MA
[4]  
Bertsekas D., 1999, NONLINEAR PROGRAMMIN
[5]  
Bharghavan V., 1994, Computer Communication Review, V24, P212, DOI 10.1145/190809.190334
[6]  
CAGALJ M, 2005, P INFOCOM
[7]   PRIORITY ACCESS SCHEMES USING CSMA-CD [J].
CHOUDHURY, GL ;
RAPPAPORT, SS .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1985, 33 (07) :620-626
[8]  
de Melo G.A.S., 1989, Neritica, V4, P1
[9]   Constrained traffic equilibrium in routing [J].
El Azouzi, R ;
Altman, E .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (09) :1656-1660
[10]  
*ETSI TSRES, 1996, 300652 ETSI TSRES