1 Distributed Selfish Replication under Node Churn Eva Jaho, Ioannis Koukoutsidis, Ioannis Stavrakakis, Ina Jaho Advanced Networking Research Group National.

Slides:



Advertisements
Similar presentations
Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
Advertisements

Nash’s Theorem Theorem (Nash, 1951): Every finite game (finite number of players, finite number of pure strategies) has at least one mixed-strategy Nash.
CS3771 Today: deadlock detection and election algorithms  Previous class Event ordering in distributed systems Various approaches for Mutual Exclusion.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Non myopic strategy Truth or Lie?. Scoring Rules One important feature of market scoring rules is that they are myopic strategy proof. That means that.
Algorithm Design Techniques: Greedy Algorithms. Introduction Algorithm Design Techniques –Design of algorithms –Algorithms commonly used to solve problems.
Mutual Exclusion By Shiran Mizrahi. Critical Section class Counter { private int value = 1; //counter starts at one public Counter(int c) { //constructor.
Evolution and Repeated Games D. Fudenberg (Harvard) E. Maskin (IAS, Princeton)
Chapter Twenty-Eight Game Theory. u Game theory models strategic behavior by agents who understand that their actions affect the actions of other agents.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
Randomized Strategies and Temporal Difference Learning in Poker Michael Oder April 4, 2002 Advisor: Dr. David Mutchler.
Non-Cooperative Game Theory To define a game, you need to know three things: –The set of players –The strategy sets of the players (i.e., the actions they.
Chapter 14 Infinite Horizon 1.Markov Games 2.Markov Solutions 3.Infinite Horizon Repeated Games 4.Trigger Strategy Solutions 5.Investing in Strategic Capital.
Calibrated Learning and Correlated Equilibrium By: Dean Foster and Rakesh Vohra Presented by: Jason Sorensen.
© 2015 McGraw-Hill Education. All rights reserved. Chapter 15 Game Theory.
EC941 - Game Theory Lecture 7 Prof. Francesco Squintani
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Playback-buffer Equalization For Streaming Media Using Stateless Transport Prioritization By Wai-tian Tan, Weidong Cui and John G. Apostolopoulos Presented.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
A Memetic Framework for Describing and Simulating Spatial Prisoner’s Dilemma with Coalition Formation Sneak Review by Udara Weerakoon.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks John C.S. Lui The Chinese University of Hong Kong Joint work.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Outline  In-Class Experiment on Centipede Game  Test of Iterative Dominance Principle I: McKelvey and Palfrey (1992)  Test of Iterative Dominance Principle.
PSY 1950 Confidence and Power December, Requisite Quote “The picturing of data allows us to be sensitive not only to the multiple hypotheses that.
“A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups ” Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bestavros, Ibrahim.
Searching in Unstructured Networks Joining Theory with P-P2P.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Game Theory.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
1 Distributed Selfish Replication Nikolaos Laoutaris Orestis Telelis Vassilios Zissimopoulos Ioannis Stavrakakis
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
1 EC9B6 Voting and Communication Lecture 1 Prof. Francesco Squintani
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
A Lyapunov Optimization Approach to Repeated Stochastic Games Michael J. Neely University of Southern California Proc.
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
1 Game Theory Sequential bargaining and Repeated Games Univ. Prof.dr. M.C.W. Janssen University of Vienna Winter semester Week 46 (November 14-15)
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
Network Aware Resource Allocation in Distributed Clouds.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Independence and Bernoulli.
Online Paging Algorithm By: Puneet C. Jain Bhaskar C. Chawda Yashu Gupta Supervisor: Dr. Naveen Garg, Dr. Kavitha Telikepalli.
Introduction to Game Theory application to networks Joy Ghosh CSE 716, 25 th April, 2003.
Networks of Queues Plan for today (lecture 6): Last time / Questions? Product form preserving blocking Interpretation traffic equations Kelly / Whittle.
DISTRIBUTED ALGORITHMS By Nancy.A.Lynch Chapter 18 LOGICAL TIME By Sudha Elavarti.
Interaction of Overlay Networks: Properties and Implications Joe W.J. Jiang Dah-Ming Chiu John C.S. Lui The Chinese University of Hong Kong.
Independence and Bernoulli Trials. Sharif University of Technology 2 Independence  A, B independent implies: are also independent. Proof for independence.
On the Optimal Scheduling for Media Streaming in Data-driven Overlay Networks Meng ZHANG with Yongqiang XIONG, Qian ZHANG, Shiqiang YANG Globecom 2006.
Evolving cooperation in one-time interactions with strangers Tags produce cooperation in the single round prisoner’s dilemma and it’s.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
Data dissemination in wireless computing environments
1 Chapter 5-1 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
Hedonic Clustering Games Moran Feldman Joint work with: Seffi Naor and Liane Lewin-Eytan.
1 Multi-radio Channel Allocation in Competitive Wireless Networks Mark Felegyhazi, Mario Čagalj, Jean-Pierre Hubaux EPFL, Switzerland IBC’06, Lisbon, Portugal.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Tree-Based Networks Cache Coherence Dr. Xiao Qin Auburn University
Satisfaction Games in Graphical Multi-resource Allocation
The Impact of Replacement Granularity on Video Caching
For modeling conflict and cooperation Schwartz/Teneketzis
Maximal Independent Set
Indexing and Hashing Basic Concepts Ordered Indices
Presentation transcript:

1 Distributed Selfish Replication under Node Churn Eva Jaho, Ioannis Koukoutsidis, Ioannis Stavrakakis, Ina Jaho Advanced Networking Research Group National and Kapodistrian University of Athens Οctober 2007

2 Overview Setting of a distributed replication group: N nodes, M objects r ij : request rate of node j for object i C j : capacity of node j t l : local access cost, t r : remote access cost, t s : access cost from an origin server Presence of node churn each node is “active” or “available” with a certain probability (ON probability) π j vjvj trtr tsts tltl t l <t r < t s origin server

Access cost of a node under a given placement P j = {set of objects replicated by node j} global placement P = {P 1, P 2, …, P N } P -j = P - P j mean access cost per unit time for node j : (the cost for an unsuccessful query is negligible)

Game formulation At the beginning of the game, each node has stored C j objects in decreasing order of r ij values During the game, nodes play sequentially and make changes to their placements so as to decrease their access cost at the end of the game Each node knows the global placement P prior to making its move (some kind of communication exists) The game is studied as a dynamic noncooperative game

Strategies Greedy local strategy: nodes locally replicate their most requested objects Greedy churn-unaware strategy: nodes change their initial placements to minimize their imminent access cost. However, they falsely consider other nodes to be always ON Greedy churn-aware strategy: nodes change their initial placements to minimize their imminent access cost, considering the probabilities with which other nodes are ON

Greedy churn-aware strategy Each node changes its initial placement to minimize its average access cost immediately after its move For an object e replicated at node j, define the average eviction cost as: For an object i not replicated at node j, define the average insertion gain as:

Greedy churn-aware strategy (contd.) Set of “eviction candidates” of node j, Є j = {e 1j, e 2j, …, e |Єj|j } Eviction candidates indexed by increasing costs: L e1,j ≤ L e2,j ≤ … ≤ L e|Єj|,j Set of “insertion candidates” of node j, I j = {i 1j, i 2j, …, i |Ij|j } Insertion candidates indexed by decreasing costs: G i1,j ≥ G i2,j ≥ … ≥ G i|Ij|,j Node j makes a maximum number m j of changes e kj <- i kj, k=1,…,m j s.t (m j ≤ min(|Є j |,| I j |))

Greedy churn-aware strategy with multiple rounds Each node applies the greedy churn-aware strategy in each round of the game The same order of the play is maintained in each round Theorem: the algorithm ends in a finite number of rounds irrespective of the order of play in each round Proof: At each step, each player may evict an object owned by a number of nodes to insert an object owned by: a) a smaller number of nodes (or none) b) a larger number of nodes with smaller probability that at least one of them is ON Hence, at a certain epoch in the future either all nodes have no objects in common, or no further replacements are possible

Equilibrium properties The strategy may not arrive in a Nash equilibrium Proof:.. … N-2 N-1 N We show that the greedy churn-aware strategy is not always sequentially rational for player N-1. Suppose both N-1, N evict the same object e. That is, the following conditions hold: G i,N-1 > L e,N-1 G i’,N > L e,N (i’ may be equal to i) If G i,N-1 L e,N-1 )

Mistreatment under the greedy churn-aware strategy for N=2 nodes, mistreatment never occurs (the 2 nd node only evicts objects belonging to the 1 st node, so the access cost of node 1 is not decreased) for N≥3, mistreatment may occur Given that the churn-aware strategy is followed by all nodes, we say a node is mistreated when its incurred access cost is higher than its greedy-local cost

Mistreatment under the greedy churn-aware strategy (contd.) In the homogeneous case (r ij  r i for all i, j, C j = C), where less reliable nodes play first (π 1 ≤ π 2 ≤ … ≤ π N ) If the set of objects evicted by node j+1 are also evicted by node j, for all j = 1,…, N-1, the greedy churn-aware strategy is mistreatment-free. The proof follows by showing that subsequent nodes have decreasing gain when making the kth feasible replacement, k = 1,2, …

Numerical evaluation We study cases where nodes have similar request rates for objects, so that mutual benefits emerge by cooperation Request rates drawn from Zipf distribution s≈ t l =1, t r =10, t s =100 N=10, M=50 C=10

Case studies Case I Nodes have the same request rates for each object Case II Nodes have different request rates and different priorities for objects

Access costs (case I) Under an LRF order, the greedy churn-aware strategy significantly improves performance When all nodes follow the greedy churn-unaware strategy, MRF better than LRF order Repeating the greedy churn-aware strategy for multiple rounds only yields a small benefit to some nodes

Access costs (case I-cntd.)

Potential gains of nodes by playing again after 1 round (case I) Node LRF MRF Random order π j =0.5  j=1… N

Participation gain (case I) Gain of a node if it follows the common churn-aware strategy, vs. keeping the greedy local placement

Access costs (case II)

Mistreatment example Set of objects: {1, 2, 3, 4, 5}, set of nodes: {1, 2} C 1 =4, C 2 =1 r 1 ={0.5, 0.4, 0.3, 0.2, 0.1}, r 2 ={0.4, 0.3, 0.5, 0.2, 0.1} π 1 =0,9, π 2 : variable t l =1, t r =10, t s =100 Placements greedy local: P 1 ={1, 2, 3, 4}, P 2 ={3} greedy churn-unaware when node 1 plays first: P 1 ={1, 2, 4, 5}, P 2 ={3} Greedy churn-aware when node 1 plays first: P 1 ={1, 2, 3, 4}, P 2 ={5} when π 2 ≤ 0.74 P 1 ={1, 2, 4, 5}, P 2 ={3} when π 2 > 0.74

Mistreatment example (cntd.) The greedy churn-unaware strategy causes mistreatment to node 1 when π 2 ≤0.74 The greedy churn-aware strategy is always better than the greedy local

Conclusions In the majority of test cases, the greedy churn-aware strategy reduces access cost over the greedy local and greedy churn-unaware strategy in most of the nodes alleviates mistreatment problems the LRF order is fair and incites nodes to participate in the game