Learn More
—A noncooperative group of users sharing a channel via ALOHA is considered. Depending on their quality of service requirements and willingness to pay, the users will select a desired throughput. The users then participate in a noncoop-erative game wherein they adjust their transmission-probability parameters in an attempt to attain their desired(More)
The Internet is by all accounts an incredible success, but in spite or maybe because of this success, its deficiencies have come under increasing scrutiny and triggered calls for new architectures to succeed it. Those architectures will, however, face a formidable incumbent in the Internet, and their ability to ultimately replace it is likely to depend(More)
—Cellular networks are facing severe traffic overloads due to the proliferation of smart handheld devices and traffic-hungry applications. A cost-effective and practical solution is to offload cellular data through WiFi. Recent theoretical and experimental studies show that a scheme, referred to as delayed WiFi offloading, can significantly save the(More)
New network technologies constantly seek to displace incumbents. Their success depends on technological superiority, the size of the incumbent's installed base, users' adoption behaviors, and various other factors. The goal of this paper is to develop an understanding of competition between network technologies and identify the extent to which different(More)
In this paper, we study end-user dynamics of communication networks employing usage-based pricing. We propose a generic network access mechanism in which users modify their access control parameter based on the quality of service they receive in order to maximize their net benefit. For the examples of users sharing access to a bandwidth resource via a(More)
We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled Kermack-McKendrick (a.k.a. stratified susceptibles-infectives (SI)) equations, captures both the measured scanning(More)
— A generic mechanism for end-user transmission rate control into a differentiated services Internet is formulated and basic results of corresponding Nash equilibria are proved. We consider specific examples of the mechanism including additive increase and multiplicative decrease inspired by present day TCP congestion control. For the example of users(More)