Parallel and distributed computation: numerical methods
Parallel and distributed computation: numerical methods
Asynchronous Stochastic Approximations
SIAM Journal on Control and Optimization
Fair end-to-end window-based congestion control
IEEE/ACM Transactions on Networking (TON)
Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit
IEEE/ACM Transactions on Networking (TON)
Performance of random medium access control, an asymptotic approach
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
IEEE Journal on Selected Areas in Communications
Utility-optimal random access: reduced complexity, fast convergence, and robust performance
IEEE Transactions on Wireless Communications
Competition of wireless providers for atomic users: equilibrium and social optimality
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Random access protocols for WLANs based on mechanism design
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
The cost of using cooperation in a wireless network
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Stackelberg contention games in multiuser networks
EURASIP Journal on Advances in Signal Processing - Special issue on game theory in signal processing and communications
MAC layer jamming mitigation using a game augmented by intervention
EURASIP Journal on Wireless Communications and Networking
Hi-index | 0.01 |
Random access has been studied for decades as a simple and practical wireless medium access control (MAC). Some of the recently developed distributed scheduling algorithms for throughput or utility maximization also take the form of random access, although extensive message passing among the nodes is required. In this paper, we would like to answer this question: is it possible to design a MAC algorithm that can achieve the optimal network utility without message passing? We provide the first positive answer to this question through a simple Aloha-type random access protocol. We prove the convergence of our algorithm for certain sufficient conditions on the system parameters, e.g., with a large enough user population. If each wireless node is capable of decoding the source MAC address of the transmitter from the interferring signal, then our algorithm indeed converges to the global optimal solution of the NUM problem. If such decoding is inaccurate, then the algorithm still converges, although optimality may not be always guaranteed. Proof of these surprisingly strong performance properties of our simple random access algorithm leverages the idea from distributed learning: each node can learn as much about the contention environment through the history of collision as through instantaneous but explicit message passing.