Cashing In On the Caching Game

Slides:



Advertisements
Similar presentations
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Advertisements

Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
Price Of Anarchy: Routing
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
1 On the price of anarchy and stability of correlated equilibria of linear congestion games By George Christodoulou Elias Koutsoupias Presented by Efrat.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
1 Caching/storage problems and solutions in wireless sensor network Bin Tang CSE 658 Seminar on Wireless and Mobile Networking.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Near Optimal Network Design With Selfish Agents Eliot Anshelevich Anirban Dasupta Eva Tardos Tom Wexler Presented by: Andrey Stolyarenko School of CS,
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Potential games, Congestion games Computational game theory Spring 2010 Adapting slides by Michal Feldman TexPoint fonts used in EMF. Read the TexPoint.
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
1 Caching Game Dec. 9, 2003 Byung-Gon Chun, Marco Barreno.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Presented by Sepehr Assadi Based on a paper by Erik D. Demaine and Morteza.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
Distributed Data Stores – Facebook Presented by Ben Gooding University of Arkansas – April 21, 2015.
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
On a Network Creation Game Joint work with Ankur Luthra, Elitza Maneva, Christos H. Papadimitriou, and Scott Shenker.
Efficiency Loss in a Network Resource Allocation Game Paper by: Ramesh Johari, John N. Tsitsiklis [ Informs] Presented by: Gayatree Ganu.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
The Effect of Collection Organization and Query Locality on IR Performance 2003/07/28 Park,
Connections between Learning Theory, Game Theory, and Optimization Maria Florina (Nina) Balcan Lecture 14, October 7 th 2010.
Analyzing Unique-Bid Auctions for Fun and Profit Ory Samorodnitzky Eran Tromer Avishai Wool.
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
ECO290E: Game Theory Lecture 6 Dynamic Games and Backward Induction.
Pricing with Markups in Competitive Markets with Congestion Nicolás Stier-Moses, Columbia Business School Joint work with José Correa, Universidad Adolfo.
Ç ç Cellular Operators in a Shared Spectrum Sivan Altinakar Supervisors: Tinaz Ekim-Asici Márk Félegyházi.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
ASSIGNMENT, DISTRIBUTION AND QOS PROVISIONING IN COMMUNICATION NETWORKS.
Improved Equilibria via Public Service Advertising Maria-Florina Balcan TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems By Ding-Chau Wang, In-Ray Chen, Chin-Ping Chu, and I-ling Yen CS5214.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Satisfaction Games in Graphical Multi-resource Allocation
On a Network Creation Game
Internet Indirection Infrastructure (i3)
Leveraging Mobile Telephony in Disaster Management
Congestion games Computational game theory Fall 2010
Network Creation Game A. Fabrikant, A. Luthra, E. Maneva,
On a Network Creation Game
Network Formation Games
Formation of Community-based Multi-hop Wireless Access Networks
Dynamic Replica Placement for Scalable Content Delivery
Circumventing the Price of Anarchy
Network Formation Games
Presentation transcript:

Cashing In On the Caching Game Replica Management in P2P Networks with Payments TODO: Check the font sizes 2. Plug in brite simulation graphs 3. Ask Gon about the parameters for the ts and brite graph 4. Ask Gon for examples of the type of files one might want to replicate 5. Ask Gon about line graph By Kamalika Chaudhuri Hoeteck Wee CS252 Final Project

The Replica Management Problem Consider: Replicating a proteins or genomics database Distributing video clips of the CS252 lectures Given a network graph: Choose a subset of nodes which replicate the file Objective: Minimize Cost Placement : Cost of replicating/caching Access: Network latency in obtaining a copy -less text -examples:

Overview The Caching Game Model [C03] Our approach : Introduce Payments Results Comparison with the Caching Game Model Conclusion

Caching Game Model [C03] Fixed Replication Cost : M Access Cost : d(i, nn(i)) Social Cost: Σ d(i, nn(i)) + kM Find replica placement that minimizes the social cost M - 2 1

What if People are Selfish ? All nodes are selfish Each node decides whether to replicate the file “Nash Equilibria” When no one wants to switch, given what the others are doing M - 2 1

Selfishness can lead to Inefficiency Optimum: Selfish: M - 2 1 M - 2 1 Placement Cost: 2M Access Cost: 10 x 1 = 10 Social Cost: 2M + 10 Placement Cost : M Access Cost : 5 + 5 x (M – 1) + M - 2 Social Cost : 7M - 2

Cost of Selfishness Measure of the cost of selfishness: Price of Anarchy (PoA) = Cost at N.E / Optimal Cost PoA determines how efficient the Nash Equilibrium configuration is Caching Game: worst-case PoA = O(N)

Introducing Payments Each node makes a bid and chooses a threshold A node replicates if bid received > threshold Access and Placement Costs as before Each node pays access cost + placement + net payment Social cost as before

An Example with Payments 1 1 1 1 1 1 M - 2 1 1 1 1

An Example with Payments 0.4 0.4 1 1 0.4 1 M - 2 0.4 0.4 1 1

An Example with Payments 0.4 0.4 1 1 0.4 1 M - 2 0.4 0.4 1 1

Finally, in NE 0.4 0.4 0.4 0.4 0.4 0.4 M - 2 0.4 0.4 0.4 0.4 Threshold: 2.0 Threshold: M

Pricing Helps! Without Payments: With Payments: M - 2 1 M - 2 1 Placement Cost: M Access Cost: 6M - 2 Social Cost: 7M – 2 PoA : 3.5 Placement Cost : 2M Access Cost : 10 Social Cost : 2M + 10 PoA : 1

But not in the worst case! Any N.E in Caching Game is also a N.E in the payment model Threshold = 0, for people caching the file Threshold = M, for people not caching the file All bids are 0 Worst Case PoA (Payment Model) ≥ Worst Case PoA (Caching Game) Can do better in the best case

Pricing Helps ! Line Graph - No Payments Line Graph – with Payments Line Graph: 10 nodes on a straight line (unit distance apart), 10 overlay nodes Talk about: PoA is better with pricing Undersupply is less (due to payments) The jagged line is because this is the worst case among 100 random samples (more samples later….) Payments do better in the mid-range of placement costs; they don’t do better when the costs are too large or too small. In the first case, there is only one replica in the whole network, so NE depends totally on the initial conditions. In the second case, everyone replicates the file. Line Graph - No Payments Line Graph – with Payments

Pricing Helps! Transit Stub – No Payments Transit Stub – with Payments Poa is slightly better w/payments Transit Stub – No Payments Transit Stub – with Payments

Pricing Helps! Power Law Graph – with Payments Brite Graph Thing to note: Over supply in NE Power Law Graph – with Payments Power Law Graph – no Payments

Variants of Our Model Facility-client model Other relevant parameters: Bounded optimistic PoA (under certain conditions) Other relevant parameters: Nodes of limited capacity Varying demands Multiple files

Conclusion Presented a payment model for replica management Observations on the payment model: Lower mean PoA for mid-range placement costs Matches previous work for very high and very low placement costs A step towards analyzing possible payment schemes in P2P network applications

Acknowledgements Byung Gon Chun John Kubiatowicz Christos Papadimitriou Kathryn Everett All others who gave us comments, suggestions and encouragement

not π [ This slide left for e ] 2.7182818284590452353602874713526624977572470936