1 Foundations of Distributed Algorithmic Mechanism Design Joan Feigenbaum Yale University

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Combinatorial Auction
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
1 Incentive-Compatible Interdomain Routing Joan Feigenbaum Yale University Vijay Ramachandran Stevens Institute of Technology Michael Schapira The Hebrew.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
1 Incentive-Compatible Inter-Domain Routing Joan Feigenbaum Yale University Colloquium at Cornell University; October.
Sharing the Cost of Multicast Transmissions J. Feigenbaum, C. Papadimitriou, S. Shenker Hong Zhang, CIS620, 4/24.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
1 Regret-based Incremental Partial Revelation Mechanism Design Nathanaël Hyafil, Craig Boutilier AAAI 2006 Department of Computer Science University of.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Courtesy: Nick McKeown, Stanford
Game Theoretic and Economic Perspectives on Interdomain Routing Michael Schapira Yale University and UC Berkeley.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno
Routing - I Important concepts: link state based routing, distance vector based routing.
Strategyproof Sharing of submodular costs: Budget Balance Vs. Efficiency Liad Blumrosen May 2001.
Price of Anarchy, and Strategyproof Network Protocol Design Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Collaborated.
Mechanism Design. Overview Incentives in teams (T. Groves (1973)) Algorithmic mechanism design (Nisan and Ronen (2000)) - Shortest Path - Task Scheduling.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
Combinatorial Auction. Conbinatorial auction t 1 =20 t 2 =15 t 3 =6 f(t): the set X  F with the highest total value the mechanism decides the set of.
11 Economics and Computation Econ 425/563 and CPSC 455/555, Fall 2008 Time: Tu & Th, 2:30-3:45 pm Room: BCT 102
Vickrey Prices and Shortest Paths What is an Edge Worth? By John Hershberger and Subhash Suri Carlos Esparza and Devin Low 3/5/02.
1 Mechanism Design for Interdomain Routing Rahul Sami Joint work with Joan Feigenbaum, David Karger, Vahab Mirrokni, Christos Papadimitriou, and Scott.
SECOND PART: Algorithmic Mechanism Design. Implementation theory Imagine a “planner” who develops criteria for social welfare, but cannot enforce the.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Incentive-Compatible Interdomain Routing Michael Berger Based on the article: “Incentive-Compatible Interdomain Routing” Joan Feigenbaum, Christos Papadimitriou,
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
1 Distributed Algorithmic Mechanism Design for Network Problems Rahul Sami Ph.D. Dissertation Defense Advisor: Joan Feigenbaum Committee: Ravindran Kannan.
1 Dynamic Routing Protocols I RIP Relates to Lab 4. The first module on dynamic routing protocols. This module provides an overview of routing, introduces.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
1 A BGP-based Mechanism for Lowest-Cost Routing Rahul Sami Yale University Joint work with: Joan Feigenbaum Yale Christos.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
Network Layer Goals: understand principles behind network layer services: –routing (path selection) –dealing with scale –how a router works –advanced topics:
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
CS 4396 Computer Networks Lab
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Using Algorithmic Mechanism Design to Solve the Data Redistribution Problem with Non-Cooperative Sensor Nodes Andre Chen July 23, 2015.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
1 Game-Theoretic Aspects of Diffuse Computing: Results and Future Directions Joan Feigenbaum Supported by the DoD URI program.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Dynamic Routing Protocols II OSPF
Algorithms, Games, and the Internet
Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Joan Feigenbaum Yale Scott Shenker ICSI Slides:
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Scott Shenker and Ion Stoica Computer Science Division
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Presentation transcript:

1 Foundations of Distributed Algorithmic Mechanism Design Joan Feigenbaum Yale University

2 Two Views of Multi-agent Systems CSECON Focus is on Computational & Communication Efficiency Agents are Obedient, Faulty, or Byzantine Focus is on Incentives Agents are Strategic

3 Secure, Multiparty Function Evaluation... t 1t 1 t 2t 2 t 3t 3 t n-1 t nt n O = O (t 1, …, t n ) Each i learns O. No i can learn anything about t j (except what he can infer from t i and O ).

4 SMFE Literature Agents 1, …, n are obedient or byzantine. Obedient agents limited to probabilistic polynomial time. (Sometimes, byzantine agents too.) Typical assumption: at most n/3 byzantine agents Typical successful protocol: − All obedient agents learn O. − No byzantine agent learns O or t j for an obedient j.

5 Internet Computation Both incentives and computational and communication efficiency matter. “Ownership, operation, and use by numerous independent self-interested parties give the Internet the characteristics of an economy as well as those of a computer.”  DAMD: “Distributed Algorithmic Mechanism Design”

6 Outline DAMD definitions and notation Short example: Multicast cost sharing General open questions Long example: Interdomain routing

7 Definitions and Notation t 1t 1 t nt n Agent 1 Agent n Mechanism... p 1p 1 a 1a 1 p np n a na n O (Private) types: t 1, …, t n Strategies: a 1, …, a n Payments: p i = p i (a 1, …, a n ) Output: O = O (a 1, …, a n ) Valuations: v i = v i (t i, O ) Utilities: u i = v i + p i (Choose a i to maximize u i.)

8 “Strategyproof” Mechanism For all i, t i, a i, and a –i = (a 1, …, a i-1, a i+i, …, a n ) v i (t i, O (a –i, t i )) + p i (a –i, t i )  v i (t i, O (a –i, a i )) + p i (a –i, a i ) “Truthfulness” “Dominant Strategy Solution Concept” Nisan-Ronen ’99: Polynomial time O ( ) and p i ( )

9 Example: Task Allocation Input: Tasks z 1, …, z k Agent i ’s type: t = (t 1, …, t k ) (t j is the minimum time in which i can complete z j ) Feasible outputs: Z = Z 1 Z 2 … Z n (Z i is the set of tasks assigned to agent i) Valuations: v i (t, Z) = −  t j Goal: Minimize max  t j i i i i i i zj  Z izj  Z i zj  Z izj  Z i iZ i

10 Nisan-Ronen Min-Work Mechanism O (a 1, …, a n ): Assign z j to agent with smallest a j p i (a 1, …, a n ) =  min a j [NR99]: Strategyproof, n-Approximation Open Questions: Average case(s)? Distributed algorithm for Min-Work? i i’ i  i’ zj  Z izj  Z i

11 Distributed AMD [FPS ’00] Agents 1, …, n Interconnection network T Numerical input {c 1, … c m }  O ( |T | ) messages total  O (1) messages per link  Polynomial time local computation  Maximum message size is polylog (n, |T |) and poly (  ||c j || ). “Good network complexity” j=1 m

12 Multicast Cost Sharing Mechanism-Design Problem ,23,0 1,26,710 Users’ types Link costs Source Which users receive the multicast? Receiver Set Cost Shares How much does each receiver pay?

13 Two Natural Mechanisms  Group-strategyproof  Budget-balanced  Minimum worst-case efficiency loss  Bad network complexity  Strategyproof  Efficient  Good network complexity  Shapley value  Marginal cost

14 Marginal Cost Receiver set: R* = arg max NW(R) R NW(R)   t i – C(T(R)) i  Ri  R Cost shares: p i = 0 if i  R* t i – [ NW ( R*( t ) ) – NW ( R* ( t | i 0 ) ) ] o.w. { Computable with two (short) messages per link and two (simple) calculations per node. [FPS ’00]

15 Shapley Value Cost shares: c( l ) is shared equally by all receivers downstream of l. (Non-receivers pay 0.) Receiver set: Biggest R* such that t i  p i, for all i  R* Any distributed algorithm that computes it must send  (n) bits over  (|T |) links in the worst case. [FKSS ’02]

16 Group-Strategyproof, BB Cost Sharing “Representative Hard Problem” to solve on the Internet Hard if it must be solved: By a distributed algorithm Computationally efficiently Incentive compatibly Becomes easy if one requirement is dropped. Open Question: Find other representative hard problems.

17 Open Question: More (Realistic) Distributed Algorithmic Mechanisms  Caching  P2P file sharing  Interdomain Routing  Distributed Task Allocation  Overlay Networks

18 Open Question: Strategic Modeling In each DAMD problem, which agents are  Obedient  Strategic [  Byzantine ] [  Faulty ] ?

19 Open Question: What about “provably hard” DAMD problems? AMD approximation is subtle; can destroy strategyproofness “Feasibly dominant strategies” [NR ’01] “Strategically faithful” approximation [FKSS ’01] “Tolerable manipulability” [FKSS ’01]

20 Revelation Principle If there is a mechanism ( O, p) that implements a design goal, then there is one that does so truthfully.... Agent 1 Agent n FOR i  1 to n SIMULATE i to COMPUTE a i O  O (a 1, …, a n ); p  p (a 1, …, a n ) p 1p 1 t 1t 1 p np n t nt n O Note: Loss of privacy Shift of computational load

21 Open Question: Design Privacy-Preserving DAMs Cannot simply “compose” a DAM with a standard SMFE protocol. −   (n) obedient agents − Unacceptable network complexity − Agents don’t “know” each other. New SMFE techniques?

22 Open Question: Can Indirect Mechanisms be More Efficient w.r.t Computation or Communication? Mechanism computation Agent computation Communication

23 Interdomain-Routing Mechanism-design Problem Inputs: Transit costs Outputs: Routes, Payments Qwest Sprint UUNET WorldNet Agents: Transit ASs

24 Problem Statement Strategyproofness “BGP-based” distributed algorithm Lowest-cost paths (LCPs) Per-packet costs {c k } Agents’ types: {route(i, j)}Outputs: (Unknown) global parameter: Traffic matrix [T ij ] {pk}{pk} Payments: Objectives:

25 Previous Work Nisan-Ronen, 1999 Single (source, destination) pair Links are the strategic agents “Private type” of l is c l (Centralized) strategyproof, polynomial-time mechanism Hershberger-Suri, 2001 p l  d G|c l =  - d G|c l =0 Compute m payments as quickly as 1

26 Our Formulation vs. NR, HS Nodes, not links, are the strategic agents. All (source, destination) pairs Distributed “BGP-based” algorithm More realistic model Advantages: Deployable via small changes to BGP

27 Notation LCPs described by indicator function: 1 if k is on the LCP from i to j, when cost vector is c 0 otherwise c Ι   (c 1, c 2, …, , …, c n ) { I k (c; i,j)  k

28 A Unique VCG Mechanism For a biconnected network, if LCP routes are always chosen, there is a unique strategyproof mechanism that gives no payment to nodes that carry no transit traffic. The payments are of the form p k =  T ij, where = c k I k (c; i, j) + [  I r (c Ι  ; i, j ) c r -  I r (c; i, j ) c r ] Theorem 1: p ij k rr i,j p ij k k

29 Features of this Mechanism Payments have a very simple dependence on traffic T ij : payment p k is the sum of per-packet prices. Price is 0 if k is not on LCP between i, j. Cost c k is independent of i and j, but price depends on i and j. Price is determined by cost of min-cost path from i to j not passing through k (min-cost “k-avoiding” path). p ij k k k k

30 BGP-based Computational Model (1) Follow abstract BGP model of Griffin and Wilfong: Network is a graph with nodes corresponding to ASes and bidirectional links; intradomain-routing issues are ignored. Each AS has a routing table with LCPs to all other nodes: Entire paths are stored, not just next hop. Dest. LCP LCP cost AS3AS53AS1 AS7AS22

31 BGP-based Computational Model (2) An AS “advertises” its routes to its neighbors in the AS graph, whenever its routing table changes. The computation of a single node is an infinite sequence of stages: Receive routes from neighbors Update routing table Advertise modified routes Complexity measures: − Number of stages required for convergence − Total communication

32 Towards Distributed Price Computation = c k + Cost ( P -k (c; i,j) ) – Cost ( P(c; i,j) ) LCPs to destination j form a tree Use data from i ’s neighbors a,b,d to compute tree edge non-tree edge j a bd i. p ij k k

33 Constructing k-avoiding Paths Three possible cases for P -k (c; i, j): j a b d i k i ’s neighbor on the path is (a) parent (b) child (d) unrelated In each case, a relation to neighbor’s LCP or price, e.g., (b) = + c b + c i is the minimum of these values. p ij k p bj k p ij k

34 A “BGP-based” Algorithm AS3AS5 c(i,1) AS1 c1c1 Dest.cost LCP and path prices LCP cost AS1 LCPs are computed and advertised to neighbors. Initially, all prices are set to . Each node repeats: − Receive LCP costs and path prices from neighbors. − Recompute path prices. − Advertise changed prices to neighbors. Final state: Node i has accurate values. p ij k p i1 3 5

35 Performance of Algorithm d’ = max i,j,k || P -k ( c; i, j ) || d = max i,j || P ( c; i, j ) || Our algorithm computes the VCG prices correctly, uses routing tables of size O(nd) (a constant factor increase over BGP), and converges in at most (d + d’) stages (worst-case additive penalty of d’ stages over the BGP convergence time). Theorem 2:

36 Open Question: Strategy in Computation Mechanism is strategyproof : ASes have no incentive to lie about c k ’s. However, payments are computed by the strategic agents themselves. How do we reconcile the strategic model with the computational model? “Quick fix” : Digital Signatures [Mitchell, Sami, Talwar, Teague] Is there a way to do this without a PKI?

37 Open Question: Overcharging In the worst case, path price can be arbitrarily higher than path cost [Archer&Tardos, 2002]. This is a general problem wiith VCG mechanisms. Statistics from a real AS graph, with unit costs: Mean node price : 1.44 Maximum node price: 9 90% of prices were 1 or 2 How do VCG prices interact with AS-graph formation? Overcharging is not a major problem!