Game Theory As a Tool for Modeling Cross-Layer Interactions

Modeling computer networks is a complex task, as their behavior depends from several variables. Focusing on a single communication device, ISO/OSI and TCP/IP layered protocol stacks provide interoperability and fast deployment of networking solutions, but they limit the control on the interaction among protocols operating at different layers. As a consequence, the need is emerging to develop appropriate models to capture and evaluate the interaction of protocols within a single communication device in order to underline such forms of "indirect" interaction - since they may lead to unforeseen performance degradations. The proposed work aims at using the game theory for capturing the interactions within the protocol stack of a single node, with the goal of allowing to determine the "steady state" or the operating point of the system in a given scenario. As a result, a scalable and modular framework is presented, that enables characterization and analysis of cross-layer interactions starting from the protocols' specifications. Finally, as an example of application, the model is applied to a single-hop IEEE 802.11 wireless network.

[1]  Yongkang Xiao,et al.  Game theory models for IEEE 802.11 DCF in wireless ad hoc networks , 2005, IEEE Communications Magazine.

[2]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[3]  A. Robert Calderbank,et al.  Reverse Engineering MAC , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[4]  Srinivasan Seshan,et al.  Selfish behavior and stability of the internet: a game-theoretic analysis of TCP , 2002, SIGCOMM.

[5]  A. Robert Calderbank,et al.  Layering as Optimization Decomposition: A Mathematical Theory of Network Architectures , 2007, Proceedings of the IEEE.

[6]  Donald F. Towsley,et al.  TCP connection game: a study on the selfish behavior of TCP users , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).

[7]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[8]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[9]  Bernhard Walke,et al.  IEEE 802.11 Wireless Local Area Networks , 2006 .

[10]  E. Rasmusen Games and Information: An Introduction to Game Theory , 2006 .

[11]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[12]  Jon Postel,et al.  Transmission Control Protocol , 1981, RFC.

[13]  W. Richard Stevens,et al.  TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms , 1997, RFC.

[14]  J. Szep,et al.  Games with incomplete information , 1985 .

[15]  Donald F. Towsley,et al.  Modeling TCP Reno performance: a simple model and its empirical validation , 2000, TNET.

[16]  Michael Devetsikiotis,et al.  Metamodeling of Wi-Fi Performance , 2006, 2006 IEEE International Conference on Communications.

[17]  Violet R. Syrotiuk,et al.  Factor interaction on service delivery in mobile ad hoc networks , 2004, IEEE Journal on Selected Areas in Communications.