Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein.

Slides:



Advertisements
Similar presentations
Capacity Allocation in Networks Under Noncooperative Elastic Users Instructor: Ishai Menache Eliron Amir Winter 2006.
Advertisements

Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Price Of Anarchy: Routing
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
The Role of Prices in Peer-Assisted Content Distribution Christina Aperijis Michael J. Freedman Ramesh Johari Presented by: Kyle Chauvin and Henry Xie.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Achieving Network Optima Using Stackelberg Routing Strategies Yannis A. Korilis, Member, IEEE Aurel A. Lazar, Fellow, IEEE & Ariel Orda, Member IEEE IEEE/ACM.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
1 On the price of anarchy and stability of correlated equilibria of linear congestion games By George Christodoulou Elias Koutsoupias Presented by Efrat.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Worst-case Equilibria Elias Koutsoupias and Christos Papadimitriou Presenter: Yishay Mansour Tight Bounds for Worst-case Equilibria Artur Czumaj and Berthold.
Stackelberg Scheduling Strategies By Tim Roughgarden Presented by Alex Kogan.
How Bad is Selfish Routing? Tim Roughgarden & Eva Tardos Presented by Wonhong Nam
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
1 Caching Game Dec. 9, 2003 Byung-Gon Chun, Marco Barreno.
How bad is selfish routing? מאת ליאור עזרא עפ " י מאמר של חווה טרדוס וטים גן - מחוספס.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
1 Quantifying Trade-Offs in Networks and Auctions Tim Roughgarden Stanford University.
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
1 Issues on the border of economics and computation נושאים בגבול כלכלה וחישוב Congestion Games, Potential Games and Price of Anarchy Liad Blumrosen ©
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Efficiency Loss in a Network Resource Allocation Game Paper by: Ramesh Johari, John N. Tsitsiklis [ Informs] Presented by: Gayatree Ganu.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Network Aware Resource Allocation in Distributed Clouds.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
The Effectiveness of Stackelberg strategies and Tolls for Network Congestion Games Chaitanya Swamy University of Waterloo.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Aug 22, 2002Sigcomm 2002 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs-research Scott Shenker ICIR.
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Contents of the Talk Preliminary Materials Motivation and Contribution
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Congestion games Computational game theory Fall 2010
Presented By Aaron Roth
Network Formation Games
The Price of Routing Unsplittable Flow
Network Formation Games
L. Glimcher, R. Jin, G. Agrawal Presented by: Leo Glimcher
Presentation transcript:

Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein

General Scenario Users sharing a pool of shared resources Users sharing a communication network Users can choose their own strategy No central control can be enforced Users can communicate with each other

Problems emerging from the scenario Lack of co-operations and greedy individual behavior leads to 1. Global loss of utility – All users suffer loss of utility due to congestion 2. Individual user loss of utility – Individual users suffer loss of utility. 3. Loss of utility which could have been gained by using more of the network Social welfare and central management Vs. Users rationality and lack of central control

Reasons for loss of utility Local optimization of each user regardless of global optimization Greedy behavior and lack of central management Instable global optimization points Due to congestion and non cooperative behavior

Agenda Model of congested networks Model of Peer to Peer Networks Suggested improvements – Coalition formation – Cooperative Nodes Current solutions Summary Further extensions

Model of Congested Networks Physical Model User Model Strategy Model Flow Model Cost / Utility Model User Optimization Nash Equilibrium Coalitions Formation

Physical Model Let G be a graph. (V,E) For each e in E let L(e) be the latency function ( G,{L(e)} ) are the physical setting

Latency functions General attributes – Continuous – Non decreasing – Differentiable Constant Linear Queue Theory Other

User model U – the user group. n the number of users ST = {Si,Ti} i=1…k (Source Target) – Si, Ti in V r(i) – the rate of user “i” in R^k R^k >=0 R = Matrix of k x n (G, L(e), U, ST,R ) instance problem

Strategy Model Given an instance problem (G, L(e), U, ST,R) Pi the simple paths from Si to Ti P The union of all Paths A strategy for a user “i” is a function f: P-> R Feasibility of function f

Flow model F – the total flow in the network F(p) – the flow in the path p For each edge e we can define F(e) The latency of a path given a flow is Lp(f) = Sum Le(Fe) (e is in P)

Cost / Utility model User cost over a flow f: Sum ( Lp(f)*f(i,p) ) The total cost of a fixed flow f Sum (Le(e)*F(e)

User Optimization and Individual rationality Given a flow F each user seeks out a strategy f such that Ci(F+f) is minimized Subject to feasibility

Nash Equilibrium points A flow F is in Nash Equilibrium point if for every user i Ci(fi) <= Ci(f*i) for each f*I

Coalition formation S subset of U Rs = Sum Ri (i in S) CoaliationValue (S) = Cs(f) – Sum (Ci(f*))

Theoretical results The existence of Nash Equilibrium points The Worst case ratio between Nash Equilibrium points and global optimization The super additive structure of the problem -> The grand coalition = central control

Peer to Peer usages Sharing of Information Software distribution Media distribution Computational Tasks Peer to Peer networks

Peer to Peer Model Special case of the general model Peer to peer networks which are currently used – Kazaa – eMule – FreeNet – Grid computing

Peer to Peer - Settings Loosely controlled networks Users Pursue their own utility – no social awareness Most users are cooperative Some users may be malicious No Side payments / Side payments are allowed Some key users may which to care about social welfare

Peer to Peer - Physical Model Clusters of users joined by the ISP nodes – Fast internal communication – Slow external communication Upload / Download bandwidth can be asymmetrical Clusters of the ISP joined by high bandwidth links – Supporting many users Number of open connections are limited per user

Peer to Peer Model – User Model Users have supply and demand of information / files Upload / Download bandwidth Users support a limited number of upload / download slots Allocate resources for social benefit – Disk Space (Cache) – Network bandwidth

Peer to Peer Model – Strategy Users wish to maximize their gain – Satisfy their demand as quickly as possible Users choose from who they wish to download – the route is chosen to maximize the bandwidth Greedy strategy Users can act as mediators and have some social awareness Users are mostly cooperative Some Users are malicious

Peer to Peer Model – Flow Users share the connections of the ISPs ISP is using equal shares for the users requests Every link is not fully used Users use a single route for information transfers

Peer to Peer – Utility Model Users wish to satisfy their demand as quickly as possible Credit system can be used Some Users are there to help the social welfare (ISP nodes / cache nodes) Users who are not active can help others Some users are malicious – wish to minimize others utility

Peer to Peer Model – User Optimization Users wish to maximize their utility – satisfy their demand Users will evaluate the preferred route for their requests and use the fastest single route Complete knowledge is assumed

Social Welfare and Private Utility Nash Equilibrium Total competitiveness –> form of congestion and inefficient network usage => Coalition formation – Sharing of information – Social awareness

Coalition Formation – Types Coordinate downloads of files that have mutual interest for both of the clients Have a pool of the credits -> Share the credits Users will upload files – For gaining higher credit value – For participating in downloading hordes Users will download popular files to increase their social value ISP – Social welfare coordinators Malicious – Detecting them (Reputation System)

Peer to Peer – Simulation Analysis Architecture Design Problems Concrete implementation

Peer to Peer – An Example 1 Supply Node – 2 slots 2 Demand Nodes – 2 Slots All are connected via ISP by a 2 kb/s link (download and upload) The Supply is generated with 10 files Coordinated Vs Non Coordinated value

Peer to Peer – Suggested Twicking eMule (Server Based) eMule - Kademlia (Distributed) FreeNet

Peer to Peer – More Issues Security – Anonymously – Secretly – Authentication Legal Aspects Protocols

Related work eMule – Credit System eDonkey – Horde Downloading FreeNet – Secure Information distribution HTTP Proxies – File Caching

Conclusions Extending the protocols to enable cooperative behavior may benefit the users Coalitions may Increase the utilization of the network and loosen congestion May be extended to other settings - computational tasks

Future Expansions More simulation and extended protocols Reputation Systems – Improve Credit System – External Credit / Utility System Resource Allocation usages Coordinators – Users who coordinate efforts

Bibliography How Bad is Selfish Routing? By Tim Roughgarden and Eva Tardos, 2000 Competitive Routing in Multi-User Communication Networks By Ariel Orda, Raphael Rom, Nahum Shimki Worst-case Equilibria By Elias Koutsoupias and Christos Papadimitrio,1999 Tight Bounds for Worst-Case Equilibria By Tight Bounds for Worst-Case Equilibria, 2002 Game Theory – 3 rd edition, By Guillermo Owen, 1995

Related Sites eMule – FreeNet – Boost –