Skip to main content

Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design

  • Conference paper
  • First Online:
MultiMedia Modeling (MMM 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11962))

Included in the following conference series:

  • 2255 Accesses

Abstract

Nowadays, the computer network plays as the most important medium in the transmitting of multimedia. Correspondingly, the orderliness of network is the protection of multimedia transmission. However, due to the Packet Switching design, the network can only provide best-effort service, in which the multimedia applications compete for its network resource. In the lawless competition, the applications are obliged to be greedy and deceptive driven by their best self-interest. As a result, the transmission of multimedia applications becomes disorderly and inefficiently, and we lose the protection of multimedia network transmission. In this paper, we first investigate the behaviors of multimedia applications with Game Theory, and summarize the disorderly transmission as a Prisoner’s Dilemma. The lost of law leads to the disorderly transmission in multimedia network. Then, we investigate the relationship between application’s media-attribute and its required transmission service, and resolve this Prisoner’s Dilemma with Mechanism Design. Specifically, a novel Media-attribute Switching (MAS) is proposed, where the network allocate the transmission resources according to the application’s claimed media-attribute. In MAS, differentiated services are provided to applications with different claimed media-attribute. We design MAS to have the honesty application gets compatible service while the deceptive application gets incompatible service. Therefore, the MAS can provide incentives for multimedia applications to label their data media-attributes honestly and allocate the network resources according to their attributes, thus to protect the multimedia network transmission. The theoretical analysis and experimental comparison both prove our MAS’s protection to the multimedia network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schwartz, M.: Network management and control issues in multimedia wireless networks. IEEE Pers. Commun. 2(3), 8–16 (1995)

    Article  Google Scholar 

  2. Sahinoglu, Z., Tekinay, S.: On multimedia networks: self-similar traffic and network performance. IEEE Commun. Mag. 37(1), 48–52 (1999)

    Article  Google Scholar 

  3. Xie, H., Mao, Z., Zhang, Y., Deng, H., Yan, C., Chen, Z.: Double-bit quantization and index hashing for nearest neighbor search. IEEE Trans. Multimed. 21(5), 1248–1260 (2018)

    Article  Google Scholar 

  4. Xie, H., Fang, S., Zha, Z.J., Yang, Y., Li, Y., Zhang, Y.: Convolutional attention networks for scene text recognition. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 15(2), 3 (2019)

    Google Scholar 

  5. Cisco Visual: Cisco visual networking index: forecast and trends, 2017–2022. White Paper 1 (2018)

    Google Scholar 

  6. Baset, S.A., Schulzrinne, H.: An analysis of the Skype peer-to-peer internet telephony protocol. arXiv preprint cs/0412017 (2004)

    Google Scholar 

  7. Cohen, B.: Incentives build robustness in BitTorrent. In: Workshop on Economics of Peer-to-Peer Systems, vol. 6, pp. 68–72 (2003)

    Google Scholar 

  8. Park, L.T., Baek, J.W., Hong, J.W.K.: Management of service level agreements for multimedia internet service using a utility model. IEEE Commun. Mag. 39(5), 100–106 (2001)

    Article  Google Scholar 

  9. Semeria, C.: Supporting differentiated service classes: queue scheduling disciplines, pp. 11–14. Juniper Networks (2001)

    Google Scholar 

  10. Carpenter, B.E., Nichols, K.: Differentiated services in the Internet. Proc. IEEE 90(9), 1479–1494 (2002)

    Article  Google Scholar 

  11. Yang, X., Liu, J., Li, N.: Congestion control based on priority drop for H.264/SVC. In: Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, pp. 585–589 (2007). https://doi.org/10.1109/MUE.2007.107

  12. Dyahadray, A., Shringarpure, H., Mulay, N., Saraph, G.: Congestion control using scalable video streaming. In: National Conference on Communications 2008 (2008)

    Google Scholar 

  13. Semeria, C.: Supporting Differentiated Service Classes: Queue Scheduling Disciplines, pp. 1–27. Juniper Networks (2000). http://users.jyu.fi/~timoh/kurssit/verkot/scheduling.pdf

  14. Shetty, N.: Design of network architectures: role of game theory and economics. Ph.D. thesis, UC Berkeley (2010)

    Google Scholar 

  15. Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  16. Nisan, N., Ronen, A.: Algorithmic mechanism design. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 129–140. ACM (1999)

    Google Scholar 

  17. Maskin, E.: Nash equilibrium and welfare optimality. Rev. Econ. Stud. 66(1), 23–38 (1999)

    Article  MathSciNet  Google Scholar 

  18. Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Technol. 11(3), 301–317 (2001)

    Article  Google Scholar 

  19. Alreshoodi, M., Woods, J., Musa, I.K.: QoE-enabled transport optimisation scheme for real-time SVC video delivery. In: 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014, pp. 865–868 (2014). https://doi.org/10.1109/CSNDSP.2014.6923949

  20. Rapoport, A., Chammah, A.M., Orwant, C.J.: Prisoner’s Dilemma: A Study in Conflict and Cooperation, vol. 165. University of Michigan Press, Ann Arbor (1965)

    Book  Google Scholar 

  21. Guo, H., Wang, Y.: SVC/AVC loss simulator donation, ISO. Technical report, IEC JTC1/SV29/WG11 and ITU-T SG16 Q. 6, Document JVTP069 (2005)

    Google Scholar 

  22. Wiegand, T., Sullivan, G., Reichel, J., Schwarz, H., Wien, M.: Joint scalable video model JSVM-9. Joint Video Team, Document JVT-V202 (2007)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the Major Scientific and Technological Special Project of Guizhou Province (20183001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youliang Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, C., Tian, Y., Xie, H. (2020). Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design. In: Ro, Y., et al. MultiMedia Modeling. MMM 2020. Lecture Notes in Computer Science(), vol 11962. Springer, Cham. https://doi.org/10.1007/978-3-030-37734-2_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37734-2_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37733-5

  • Online ISBN: 978-3-030-37734-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics