Vai al contenuto principale della pagina

Ad hoc networks telecommunications and game theory / / Malek Benslama, Mohamed Lamine Boucenna, Hadj Batatia



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Benslama Malek Visualizza persona
Titolo: Ad hoc networks telecommunications and game theory / / Malek Benslama, Mohamed Lamine Boucenna, Hadj Batatia Visualizza cluster
Pubblicazione: London, England ; ; Hoboken New Jersey : , : ISTE : , : Wiley, , 2015
©2015
Descrizione fisica: 1 online resource (167 p.)
Disciplina: 004.68
Soggetto topico: Ad hoc networks (Computer networks) - Mathematical models
Game theory
Persona (resp. second.): BoucennaMohamed Lamine
BatatiaHadj
Note generali: Description based upon print version of record.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Cover; Title Page; Copyright; Contents; Foreword; Introduction; List of Acronyms; 1: Ad Hoc Networks: Study and Discussion of Performance; 1.1. Introduction; 1.2. Concepts specific to ad hoc networks; 1.2.1. Topology; 1.2.2. Connectivity; 1.2.3. Mobility; 1.2.4. Networks: wireless mesh network (WMN), wireless sensor networks (WSN) and mobile ad hoc network (MANET); 1.2.4.1. Wireless Mesh Network; 1.2.4.2. WSN sensor network; 1.2.4.3. MANET mobile network; 1.2.5. Routing; 1.2.5.1. Proactive protocols; 1.2.5.2. Reactive protocols; 1.2.5.3. Hybrid protocols; 1.2.6. Weak security
1.2.7. Access to the environment1.3. MAC protocols in mobile ad hoc networks; 1.3.1. ALOHA; 1.3.1.1. Slotted ALOHA (SALOHA); 1.3.1.2. Multi-copy ALOHA; 1.3.2. CSMA; 1.3.2.1. CSMA with collision detection (CSMA/CD); 1.3.2.2. Standard 802.11 and the DCF algorithm; 1.3.2.3. CSMA/CA; 1.3.2.3.1. ACK principle; 1.3.2.3.2. Definitions of IFS; 1.3.2.3.3. Backoff; 1.3.2.3.4. RTS/CTS; 1.3.2.3.5. MAC frames in 802.11; 1.4. Energy consumption in ad hoc networks; 1.4.1. Energy overconsumption and/or waste; 1.4.2. Toward more efficient energy consumption; 1.4.2.1. Data link layer; 1.4.2.1.1. MAC sublayer
1.4.2.1.2. LLC sublayer1.5. Conclusion; 2: Game Theory and Communication Networks; 2.1. Introduction; 2.2. Introductory concepts in game theory; 2.2.1. Game; 2.2.2. Player; 2.2.3. Strategy (pure and mixed); 2.2.4. Utility; 2.2.5. General classification of games; 2.2.5.1. Cooperative and non-cooperative games; 2.2.5.2. Normal-form and extensive-form; 2.2.5.3. Perfect and imperfect information games; 2.2.5.4. Repeated games; 2.2.6. Equilibrium; 2.2.6.1. Best response and dominant strategy; 2.2.6.2. Dominant strategy equilibrium; 2.3. Nash equilibrium; 2.3.1. Definition; 2.3.2. Existence
2.3.3. Uniqueness2.3.4. Specific cases; 2.4. Famous games; 2.4.1. The prisoner's dilemma; 2.4.2. Cournot duopoly; 2.5. Applications to wireless networks; 2.5.1. Routing game; 2.5.2. Power control game; 2.6. Conclusion; 3: Games in SALOHA Networks; 3.1. Introduction; 3.2. Functioning of the SALOHA algorithm; 3.2.1. Study of stability; 3.2.2. Transmission time; 3.3. Modeling of node behavior in SALOHA with a strategic coding game; 3.3.1. Issues; 3.3.2. RS erasure codes; 3.3.3. The impact of erasure encoding on SALOHA; 3.3.4. Description of game model; 3.3.5. Study of utility
3.3.6. Discussion of equilibrium3.3.6.1. Existence; 3.3.6.2. Evaluation; 3.4. SALOHA network performance at Nash equilibrium; 3.4.1. Coding cost; 3.4.2. Loss rate; 3.4.3. Output; 3.4.4. Stability; 3.4.5. Transmission time; 3.5. Conclusion; 4: Games in CSMA Networks; 4.1. Introduction; 4.2. CMSA performance; 4.3. Sources of problems in CSMA networks; 4.4. Modeling of node behavior in CSMA using a strategic coding game; 4.4.1. Game model analysis; 4.4.2. Utility function; 4.4.3. Discussion of equilibrium; 4.5. CSMA performances at equilibrium; 4.5.1. Coding/decoding price (cost); 4.5.2. Output
4.5.3. Transmission time
Sommario/riassunto: Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura
Titolo autorizzato: Ad hoc networks telecommunications and game theory  Visualizza cluster
ISBN: 1-119-08900-X
1-119-08937-9
1-119-08938-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910829110103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Focus series in networks and telecommunications.