Information Technology Reference
In-Depth Information
Fig. 3.1 An example of three
links under the protocol
interference model
T 3
R 3
R 1
T 1
T 2
R 2
I i
define the interference ranges of transmitters. Let
denote the set of receivers
I i denote the set of transmitters that
causes interference to receiver R i . In a time-slotted system, each user i contends for
the opportunity of data transmission with probability q i
that transmitter T i causes interference to, and
[0, 1] in a time slot. If
multiple interfering links contend in the same time slot, a collision occurs and no
link can grab the transmission opportunity. Then the probability b i that user i can
grab the transmission opportunity is given by
q i
j I i
b i ( q i , q i )
=
(1
q j ) .
(3.1)
We assume that the individual utility of user i is given by
u i ( q i , q
i )
=
log ( ʸ i b i )
c i q i
(3.2)
where ʸ i > 0 represents user i 's efficiency of utilizing the transmission opportunity
(e.g., transmission rate), and c i > 0 represents user i 's cost of contention. Note that
the logarithmic function is widely used for modeling the utility of wireless users
[ 3 , 4 ]. Then, under the SGUM framework, we define the SGUM-based random
access control game as G
(
N
,
{
q i }
,
{
f i }
), where
ʸ i q i
j I i
f i ( q i , q i )
=
log
(1
q j )
c i q i
ʸ j q j
k I j
s ij
log
(1
p k )
c j q j
.
(3.3)
j = i
 
Search WWH ::




Custom Search