On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.

Slides:



Advertisements
Similar presentations
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Advertisements

Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
Price Of Anarchy: Routing
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
1 Smooth Games and Intrinsic Robustness Christodoulou and Koutsoupias, Roughgarden Slides stolen/modified from Tim Roughgarden TexPoint fonts used in EMF.
A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves Fabian Kuhn, Microsoft Research, Silicon Valley Stefan.
Fabian Kuhn, Microsoft Research, Silicon Valley
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
Combinatorial Algorithms
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
Chapter 3 The Greedy Method 3.
Churn and Selfishness: Two Peer-to-Peer Computing Challenges Invited Talk University of California, Berkeley 380 Soda Hall March, 2006 Stefan Schmid Distributed.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distributed Computing Group On the Impact of Malicious Players in Distributed Systems Stefan Schmid DYNAMO’07: 1st Workshop on Dynamic Networks (Salerno,
Economics of P2P Computing Stefan Schmid Distributed Computing Group.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Oberseminar TU München,
1 Vertex Cover Problem Given a graph G=(V, E), find V' ⊆ V such that for each edge (u, v) ∈ E at least one of u and v belongs to V’ and |V’| is minimized.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Visit at Los Alamos National.
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Distributed Combinatorial Optimization
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Algorithms and Economics of Networks: Coordination Mechanisms Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
Algorithms for Network Optimization Problems This handout: Minimum Spanning Tree Problem Approximation Algorithms Traveling Salesman Problem.
1 On the Windfall of Friendship: Inoculation Strategies on Social Networks Dominic Meier Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Algorithm Analysis CS 400/600 – Data Structures. Algorithm Analysis2 Abstract Data Types Abstract Data Type (ADT): a definition for a data type solely.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
1 Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Stanford University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Vasilis Syrgkanis Cornell University
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
Approximation Algorithms by bounding the OPT Instructor Neelima Gupta
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Clustering Data Streams A presentation by George Toderici.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
On a Network Creation Game
Congestion games Computational game theory Fall 2010
Haim Kaplan and Uri Zwick
Local Connection Game.
Network Formation Games
Selfish Load Balancing
Network Formation Games
Presentation transcript:

On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA

Stefan Schmid, ETH IPTPS Motivation –CPU Cycles –Memory –Bandwidth –…–… Power of Peer-to-Peer Computing = Accumulation of Resources of Individual Peers Collaboration is of peers is vital! However, many free riders in practice!

Stefan Schmid, ETH IPTPS Motivation Free riding –Downloading without uploading –Using storage of other peers without contributing own disk space –Etc. In this talk: selfish neighbor selection in unstructured P2P systems Goals of selfish peer: (1)Maintain links only to a few neighbors (small out-degree) (2)Small latencies to all other peers in the system (fast lookups) What is the impact on the P2P topologies?

Stefan Schmid, ETH IPTPS Talk Overview Problem statement Game-theoretic tools How good / bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers Conclusion

Stefan Schmid, ETH IPTPS Problem Statement (1) n peers {  0, …,  n-1 } distributed in a metric space –Metric space defines distances between peers –triangle inequality, etc. –E.g., Euclidean plane Metric Space

Stefan Schmid, ETH IPTPS Problem Statement (2) Each peer can choose… –to which –and how many –… other peers its connects ii Yields a directed graph G

Stefan Schmid, ETH IPTPS Problem Statement (3) Goal of a selfish peer: (1)Maintain a small number of neighbors only (out-degree) (2)Small stretches to all other peers in the system - Only little memory used - Small maintenance overhead –Fast lookups! –Shortest distance using edges of peers in G… –… divided by shortest direct distance

Stefan Schmid, ETH IPTPS Cost of a peer: –Number of neighbors (out-degree) times a parameter  –plus stretches to all other peers –  captures the trade-off between link and stretch cost cost i =  outdeg i +  i  j stretch G (  i,  j ) Problem Statement (4) Goal of a peer: Minimize its cost!

Stefan Schmid, ETH IPTPS Talk Overview Problem statement Game-theoretic tools How good / bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers Conclusion

Stefan Schmid, ETH IPTPS Game-theoretic Tools (1) Social Cost –Sum of costs of all individual peers: Cost =  i cost i =  i (  outdeg i +  i  j stretch G (  i,  j )) Social Optimum OPT –Topology with minimal social cost of a given problem instance –=> “topology formed by collaborating peers”! What topologies do selfish peers form? => Concepts of Nash equilibrium and Price of Anarchy

Stefan Schmid, ETH IPTPS Game-theoretic Tools (2) Nash equilibrium –“Result” of selfish behavior => “topology formed by selfish peers” –Topology in which no peer can reduce its costs by changing its neighbor set –In the following, let NASH be social cost of worst equilibrium Price of Anarchy –Captures the impact of selfish behavior by comparison with optimal solution –Formally: social costs of worst Nash equilibrium divided by optimal social cost PoA = max I {NASH(I) / OPT(I)}

Stefan Schmid, ETH IPTPS Talk Overview Problem statement Game-theoretic tools How good / bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers Conclusion

Stefan Schmid, ETH IPTPS Analysis: Social Optimum For connectivity, at least n links are necessary –=> OPT ¸  n Each peer has at least stretch 1 to all other peers –=> OPT ¸ n ¢ (n-1) ¢ 1 =  (n 2 ) Theorem: Optimal social costs are at least OPT 2  n + n 2 )

Stefan Schmid, ETH IPTPS Analysis: Social Cost of Nash Equilibria In any Nash equilibrium, no stretch exceeds  +1 –Otherwise, it’s worth connecting to the corresponding peer –Holds for any metric space! A peer can connect to at most n-1 other peers Thus: cost i ·  O(n) + (  O(n) => social cost Cost 2 O(  n 2 ) Theorem: In any metric space, NASH 2  n 2 )

Stefan Schmid, ETH IPTPS Analysis: Price of Anarchy (Upper Bound) Since OPT =  (  n + n 2 )... … and since NASH = O(  n 2 ), we have the following upper bound for the price of anarchy: Theorem: In any metric space, PoA 2  (min{ , n}).

Stefan Schmid, ETH IPTPS Analysis: Price of Anarchy (Lower Bound) (1) Price of anarchy is tight, i.e., it also holds that Theorem: The price of anarchy is PoA 2  min{ ,n}) This is already true in a 1-dimensional Euclidean space: 11 22 33 44 55  i-1 ii  i+1 nn ½  ½  2 33 ½  4 ½  i-2  i-1 ½i½i ½  n-1 … … … … Peer: Position:

Stefan Schmid, ETH IPTPS Price of Anarchy: Lower Bound (2) 11 22 33 44 55  i-1 ii  i+1 nn ½  ½  2 33 ½  4 ½  i-2  i-1 ½i½i ½  n-1 … … … … Peer: Position: To prove: (1) “is a selfish topology” = instance forms a Nash equilibrium (2) “has large costs compared to OPT” = the social cost of this instance is  (  n 2 ) Note: Social optimum is at most O(  n + n 2 ):

Stefan Schmid, ETH IPTPS Price of Anarchy: Lower Bound (3) Proof Sketch: Nash? –Even peers: For connectivity, at least one link to a peer on the left is needed With this link, all peers on the left can be reached with an optimal stretch 1 No link to the right can reduce the stretch costs to other peers by more than  –Odd peers: For connectivity, at least one link to a peer on the left is needed With this link, all peers on the left can be reached with an optimal stretch 1 Moreover, it can be shown that all alternative or additional links to the right entail larger costs ½  ½  2 33 ½  4 … … … 6 55

Stefan Schmid, ETH IPTPS Price of Anarchy: Lower Bound (4) Idea why social cost are  (  n 2 ):  (n 2 ) stretches of size  (  ) The stretches from all odd peers i to a even peers j>i have stretch >  / ½  ½  2 33 ½  4 … … … And also the stretches between even peer i and even peer j>i are >  /2

Stefan Schmid, ETH IPTPS Price of Anarchy PoA can grow linearly in the total number of peers Theorem: The price of anarchy is PoA 2  min{ ,n}) PoA can grow linearly in the relative importance of degree costs 

Stefan Schmid, ETH IPTPS Talk Overview Problem statement Game-theoretic tools How good / bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers Conclusion

Stefan Schmid, ETH IPTPS Stability (1) Peers change their neighbors to improve their individual costs. Theorem: Even in the absence of churn, peer mobility or other sources of dynamism, the system may never stabilize (i.e., P2P system never reaches a Nash equilibrium)! How long thus it take until no peer has an incentive to change its neighbors anymore?

Stefan Schmid, ETH IPTPS Stability (2) Example for  =0.6 Euclidean plane: 11 22 aa bb cc 2-2  1 2+   …arbitrary small number

Stefan Schmid, ETH IPTPS Stability (3) 11 22 aa bb cc Example sequence: Again initial situation => Changes repeat forever! Generally, it can be shown that there is no set of links for this instance where no peer has an incentive to change.

Stefan Schmid, ETH IPTPS Stability (4) So far: no Nash equilibrium for  =0.6 11 But example can be extended for  of all magnitudes: - Replace single peers by group of k=n/5 very close peers on a line - No pure Nash equilibrium for  =0.6k 22 cc bb aa k

Stefan Schmid, ETH IPTPS Talk Overview Problem statement Game-theoretic tools How good / bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers Conclusion

Stefan Schmid, ETH IPTPS Conclusion Unstructured topologies created by selfish peers Efficiency of topology deteriorates linearly in the relative importance of links compared to stretch costs, and in the number of peers Instable even in static environments Future Work: - Complexity of stability? NP-hard! - Routing or congestion aspects? - Other forms of selfish behavior? - More local view of peers? - Mechanism design?

Stefan Schmid, ETH IPTPS Questions? Thank you for your attention! Acknowledgments: Uri Nadav from Tel Aviv University, Israel Yvonne Anne Oswald from ETH, Switzerland