Skip to main content
Top

2020 | OriginalPaper | Chapter

Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design

Authors : Chuanbin Liu, Youliang Tian, Hongtao Xie

Published in: MultiMedia Modeling

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, the computer network plays as the most important medium in the transmitting of multimedia. Correspondingly, the orderliness of network is the protection of multimedia transmission. However, due to the Packet Switching design, the network can only provide best-effort service, in which the multimedia applications compete for its network resource. In the lawless competition, the applications are obliged to be greedy and deceptive driven by their best self-interest. As a result, the transmission of multimedia applications becomes disorderly and inefficiently, and we lose the protection of multimedia network transmission. In this paper, we first investigate the behaviors of multimedia applications with Game Theory, and summarize the disorderly transmission as a Prisoner’s Dilemma. The lost of law leads to the disorderly transmission in multimedia network. Then, we investigate the relationship between application’s media-attribute and its required transmission service, and resolve this Prisoner’s Dilemma with Mechanism Design. Specifically, a novel Media-attribute Switching (MAS) is proposed, where the network allocate the transmission resources according to the application’s claimed media-attribute. In MAS, differentiated services are provided to applications with different claimed media-attribute. We design MAS to have the honesty application gets compatible service while the deceptive application gets incompatible service. Therefore, the MAS can provide incentives for multimedia applications to label their data media-attributes honestly and allocate the network resources according to their attributes, thus to protect the multimedia network transmission. The theoretical analysis and experimental comparison both prove our MAS’s protection to the multimedia network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Schwartz, M.: Network management and control issues in multimedia wireless networks. IEEE Pers. Commun. 2(3), 8–16 (1995)CrossRef Schwartz, M.: Network management and control issues in multimedia wireless networks. IEEE Pers. Commun. 2(3), 8–16 (1995)CrossRef
2.
go back to reference Sahinoglu, Z., Tekinay, S.: On multimedia networks: self-similar traffic and network performance. IEEE Commun. Mag. 37(1), 48–52 (1999)CrossRef Sahinoglu, Z., Tekinay, S.: On multimedia networks: self-similar traffic and network performance. IEEE Commun. Mag. 37(1), 48–52 (1999)CrossRef
3.
go back to reference Xie, H., Mao, Z., Zhang, Y., Deng, H., Yan, C., Chen, Z.: Double-bit quantization and index hashing for nearest neighbor search. IEEE Trans. Multimed. 21(5), 1248–1260 (2018)CrossRef Xie, H., Mao, Z., Zhang, Y., Deng, H., Yan, C., Chen, Z.: Double-bit quantization and index hashing for nearest neighbor search. IEEE Trans. Multimed. 21(5), 1248–1260 (2018)CrossRef
4.
go back to reference Xie, H., Fang, S., Zha, Z.J., Yang, Y., Li, Y., Zhang, Y.: Convolutional attention networks for scene text recognition. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 15(2), 3 (2019) Xie, H., Fang, S., Zha, Z.J., Yang, Y., Li, Y., Zhang, Y.: Convolutional attention networks for scene text recognition. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 15(2), 3 (2019)
5.
go back to reference Cisco Visual: Cisco visual networking index: forecast and trends, 2017–2022. White Paper 1 (2018) Cisco Visual: Cisco visual networking index: forecast and trends, 2017–2022. White Paper 1 (2018)
6.
go back to reference Baset, S.A., Schulzrinne, H.: An analysis of the Skype peer-to-peer internet telephony protocol. arXiv preprint cs/0412017 (2004) Baset, S.A., Schulzrinne, H.: An analysis of the Skype peer-to-peer internet telephony protocol. arXiv preprint cs/0412017 (2004)
7.
go back to reference Cohen, B.: Incentives build robustness in BitTorrent. In: Workshop on Economics of Peer-to-Peer Systems, vol. 6, pp. 68–72 (2003) Cohen, B.: Incentives build robustness in BitTorrent. In: Workshop on Economics of Peer-to-Peer Systems, vol. 6, pp. 68–72 (2003)
8.
go back to reference Park, L.T., Baek, J.W., Hong, J.W.K.: Management of service level agreements for multimedia internet service using a utility model. IEEE Commun. Mag. 39(5), 100–106 (2001)CrossRef Park, L.T., Baek, J.W., Hong, J.W.K.: Management of service level agreements for multimedia internet service using a utility model. IEEE Commun. Mag. 39(5), 100–106 (2001)CrossRef
9.
go back to reference Semeria, C.: Supporting differentiated service classes: queue scheduling disciplines, pp. 11–14. Juniper Networks (2001) Semeria, C.: Supporting differentiated service classes: queue scheduling disciplines, pp. 11–14. Juniper Networks (2001)
10.
go back to reference Carpenter, B.E., Nichols, K.: Differentiated services in the Internet. Proc. IEEE 90(9), 1479–1494 (2002)CrossRef Carpenter, B.E., Nichols, K.: Differentiated services in the Internet. Proc. IEEE 90(9), 1479–1494 (2002)CrossRef
12.
go back to reference Dyahadray, A., Shringarpure, H., Mulay, N., Saraph, G.: Congestion control using scalable video streaming. In: National Conference on Communications 2008 (2008) Dyahadray, A., Shringarpure, H., Mulay, N., Saraph, G.: Congestion control using scalable video streaming. In: National Conference on Communications 2008 (2008)
14.
go back to reference Shetty, N.: Design of network architectures: role of game theory and economics. Ph.D. thesis, UC Berkeley (2010) Shetty, N.: Design of network architectures: role of game theory and economics. Ph.D. thesis, UC Berkeley (2010)
15.
go back to reference Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH
16.
go back to reference Nisan, N., Ronen, A.: Algorithmic mechanism design. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 129–140. ACM (1999) Nisan, N., Ronen, A.: Algorithmic mechanism design. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 129–140. ACM (1999)
18.
go back to reference Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Technol. 11(3), 301–317 (2001)CrossRef Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Technol. 11(3), 301–317 (2001)CrossRef
19.
20.
go back to reference Rapoport, A., Chammah, A.M., Orwant, C.J.: Prisoner’s Dilemma: A Study in Conflict and Cooperation, vol. 165. University of Michigan Press, Ann Arbor (1965)CrossRef Rapoport, A., Chammah, A.M., Orwant, C.J.: Prisoner’s Dilemma: A Study in Conflict and Cooperation, vol. 165. University of Michigan Press, Ann Arbor (1965)CrossRef
21.
go back to reference Guo, H., Wang, Y.: SVC/AVC loss simulator donation, ISO. Technical report, IEC JTC1/SV29/WG11 and ITU-T SG16 Q. 6, Document JVTP069 (2005) Guo, H., Wang, Y.: SVC/AVC loss simulator donation, ISO. Technical report, IEC JTC1/SV29/WG11 and ITU-T SG16 Q. 6, Document JVTP069 (2005)
22.
go back to reference Wiegand, T., Sullivan, G., Reichel, J., Schwarz, H., Wien, M.: Joint scalable video model JSVM-9. Joint Video Team, Document JVT-V202 (2007) Wiegand, T., Sullivan, G., Reichel, J., Schwarz, H., Wien, M.: Joint scalable video model JSVM-9. Joint Video Team, Document JVT-V202 (2007)
Metadata
Title
Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design
Authors
Chuanbin Liu
Youliang Tian
Hongtao Xie
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37734-2_53