File Transfer Application For Sharing Femto Access

被引:0
|
作者
Krichen, Mariem [1 ]
Cohen, Johanne [1 ]
Barth, Dominique [1 ]
机构
[1] Univ Versailles, PRiSM, 45 Ave Etats Unis, F-78035 Versailles, France
关键词
Component: game theory; Sharing femto access; Nash Equilibrium; Distributed learning algorithm;
D O I
10.1007/978-1-4471-2155-8_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In wireless access network optimization, today's main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their capacity problems in areas where the macro network signal is not able to serve the demand for mobile data. Thus, the major issue for operators is to find the best solution at reasonable expanses. The femto cell seems to be the answer to this problematic. In this work, we focus on sharing femto access between a same mobile operator's customers. This problem is modeled as a game where service requesters customers (SRCs) and service providers customers (SPCs) are the players. This article considers one SPC. SRCs are static and have some similar and regular connection behavior. Moreover, the SPC and each SRC have a software embedded respectively on its femto access, user equipment. After each SRC's connection request, its software will learn the strategy increasing its gain using local information. We present a distributed learning algorithm with incomplete information running in SRCs software. This work answers these questions: Does the distributed algorithm converge to a stable state? If yes, does this state a Nash Equilibrium and how many iterations we need to reach it?
引用
收藏
页码:191 / 198
页数:8
相关论文
共 50 条
  • [1] DCNA FILE TRANSFER AND FILE ACCESS PROTOCOLS
    SOBAMI, M
    MIYAZAWA, M
    JAPAN TELECOMMUNICATIONS REVIEW, 1979, 21 (04): : 370 - 377
  • [2] UBIQUITOUS FEMTO AWARENESS APPLICATION ACCESS AND SERVICE RECOMMENDATION
    Wang, Yingjie
    Zhang, Yongsheng
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, 2011, : 521 - 525
  • [3] Open access will deter illegal file-sharing
    Martin Dufva
    Nature, 2003, 426 : 15 - 15
  • [4] Open access will deter illegal file-sharing
    Dufva, M
    NATURE, 2003, 426 (6962) : 15 - 15
  • [5] DCNA FILE TRANSFER ACCESS AND JOB TRANSFER PROTOCOLS
    MIYAZAWA, M
    MURATA, K
    KATO, Y
    OGAWA, Y
    REVIEW OF THE ELECTRICAL COMMUNICATIONS LABORATORIES, 1982, 30 (01): : 181 - 196
  • [6] File Sharing and the History of Computing: Or, Why File Sharing is Called "File Sharing"
    John, Nicholas A.
    CRITICAL STUDIES IN MEDIA COMMUNICATION, 2014, 31 (03) : 198 - 211
  • [7] DCNA FILE TRANSFER ACCESS PROTOCOL IMPLEMENTATION
    TOH, T
    IKEHAMA, H
    MURATA, K
    REVIEW OF THE ELECTRICAL COMMUNICATIONS LABORATORIES, 1982, 30 (06): : 1011 - 1022
  • [8] Sharing digital data ((FTP) File Transfer Protocol)
    Sipes, Jaines L.
    LANDSCAPE ARCHITECTURE, 2008, 98 (03): : 68 - +
  • [9] DCNA FILE TRANSFER/ACCESS AND JOB TRANSFER PROTOCOLS.
    Miyazawa, Masayuki
    Murata, Kentaro
    Kato, Yasuo
    Ogawa, Yutaka
    Reports of the Electrical Communication Laboratory, 1982, 30 (01): : 181 - 196
  • [10] An Insight into File Sharing Artifacts using Xender Application
    Khandelwal, Shantanu
    Sailor, Ishita R.
    Mistry, Nilay
    Dahiya, Mohinder Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 386 - 389