Information Technology Reference
In-Depth Information
is the service forwarded by a forwarder j to the access point. The situation is
as shown in Figure 5.17.
Access point maximizes revenue
over broadcasted and
User responses are different for
every and
Fraction (1 - k ) of user 2's channel
is reserved for its own data
Fraction l of user 1's data stream
Fraction k of user 2's channel is
devoted to forwarding for user 1
Fraction (1 - l ) of
user 1's data stream
User 1 maximizes its net utility
over p1 and l for every and
User 2 maximizes its net utility
over p2 and k for every and
FIGURE 5.17: Charging of network service and reimbursement of data for-
warding [Ileri et al., 2005].
Simulation
results
indicate
that
the
proposed
service
reimbursement
scheme generally improves the network aggregate utility.
Salem et al. [Salem et al., 2006] also considered a payment-based scheme for
encouraging cooperation. However, their scheme involves real monetary costs
and a payment clearance infrastructure (e.g., a billing account for each user).
The charging and rewarding scheme is similar to that we described aboveā€”a
forwarder will get reimbursed and a normal user using network service will
get charged.
Marbach and Qiu [Marbach and Qiu, 2005] investigated a similar problem
based on individual device pricing. However, the main differences are that each
device is allowed to freely decide how much to charge for forwarding tra c
(in previous researches, usually the unit price is the same for all devices) and
there is no budget constraint on all the devices.
Wang and Li [Wang and Li, 2005] proposed an auction-based scheme sim-
ilar to the work by Gupta and Somani [Gupta and Somani, 2004] that we
described in Section 5.2.1.8. Specifically, each device in a wireless ad hoc net-
work declares its cost for forwarding data when some other device wants to
initiate a multihop transmission. After considering all possible paths that are
able to reach the destination device, the least cost path is chosen and the
devices on the path are paid for their forwarding. Again using a VCG-based
analysis, it is shown that the dominant action for each device is to report its
true cost of forwarding. Wang and Li also showed that no truthful mechanism
Search WWH ::




Custom Search