Presentation is loading. Please wait.

Presentation is loading. Please wait.

Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein.

Similar presentations


Presentation on theme: "Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein."— Presentation transcript:

1 Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein

2 General Scenario Users sharing a pool of shared resources Users sharing a communication network Users can choose their own strategy No central control can be enforced Users can communicate with each other

3 Problems emerging from the scenario Lack of co-operations and greedy individual behavior leads to 1. Global loss of utility – All users suffer loss of utility due to congestion 2. Individual user loss of utility – Individual users suffer loss of utility. 3. Loss of utility which could have been gained by using more of the network Social welfare and central management Vs. Users rationality and lack of central control

4 Reasons for loss of utility Local optimization of each user regardless of global optimization Greedy behavior and lack of central management Instable global optimization points Due to congestion and non cooperative behavior

5 Agenda Model of congested networks Model of Peer to Peer Networks Suggested improvements – Coalition formation – Cooperative Nodes Current solutions Summary Further extensions

6 Model of Congested Networks Physical Model User Model Strategy Model Flow Model Cost / Utility Model User Optimization Nash Equilibrium Coalitions Formation

7 Physical Model Let G be a graph. (V,E) For each e in E let L(e) be the latency function ( G,{L(e)} ) are the physical setting

8 Latency functions General attributes – Continuous – Non decreasing – Differentiable Constant Linear Queue Theory Other

9 User model U – the user group. n the number of users ST = {Si,Ti} i=1…k (Source Target) – Si, Ti in V r(i) – the rate of user “i” in R^k R^k >=0 R = Matrix of k x n (G, L(e), U, ST,R ) instance problem

10 Strategy Model Given an instance problem (G, L(e), U, ST,R) Pi the simple paths from Si to Ti P The union of all Paths A strategy for a user “i” is a function f: P-> R Feasibility of function f

11 Flow model F – the total flow in the network F(p) – the flow in the path p For each edge e we can define F(e) The latency of a path given a flow is Lp(f) = Sum Le(Fe) (e is in P)

12 Cost / Utility model User cost over a flow f: Sum ( Lp(f)*f(i,p) ) The total cost of a fixed flow f Sum (Le(e)*F(e)

13 User Optimization and Individual rationality Given a flow F each user seeks out a strategy f such that Ci(F+f) is minimized Subject to feasibility

14 Nash Equilibrium points A flow F is in Nash Equilibrium point if for every user i Ci(fi) <= Ci(f*i) for each f*I

15 Coalition formation S subset of U Rs = Sum Ri (i in S) CoaliationValue (S) = Cs(f) – Sum (Ci(f*))

16 Theoretical results The existence of Nash Equilibrium points The Worst case ratio between Nash Equilibrium points and global optimization The super additive structure of the problem -> The grand coalition = central control

17 Peer to Peer usages Sharing of Information Software distribution Media distribution Computational Tasks Peer to Peer networks

18 Peer to Peer Model Special case of the general model Peer to peer networks which are currently used – Kazaa – eMule – FreeNet – Grid computing

19 Peer to Peer - Settings Loosely controlled networks Users Pursue their own utility – no social awareness Most users are cooperative Some users may be malicious No Side payments / Side payments are allowed Some key users may which to care about social welfare

20 Peer to Peer - Physical Model Clusters of users joined by the ISP nodes – Fast internal communication – Slow external communication Upload / Download bandwidth can be asymmetrical Clusters of the ISP joined by high bandwidth links – Supporting many users Number of open connections are limited per user

21 Peer to Peer Model – User Model Users have supply and demand of information / files Upload / Download bandwidth Users support a limited number of upload / download slots Allocate resources for social benefit – Disk Space (Cache) – Network bandwidth

22 Peer to Peer Model – Strategy Users wish to maximize their gain – Satisfy their demand as quickly as possible Users choose from who they wish to download – the route is chosen to maximize the bandwidth Greedy strategy Users can act as mediators and have some social awareness Users are mostly cooperative Some Users are malicious

23 Peer to Peer Model – Flow Users share the connections of the ISPs ISP is using equal shares for the users requests Every link is not fully used Users use a single route for information transfers

24 Peer to Peer – Utility Model Users wish to satisfy their demand as quickly as possible Credit system can be used Some Users are there to help the social welfare (ISP nodes / cache nodes) Users who are not active can help others Some users are malicious – wish to minimize others utility

25 Peer to Peer Model – User Optimization Users wish to maximize their utility – satisfy their demand Users will evaluate the preferred route for their requests and use the fastest single route Complete knowledge is assumed

26 Social Welfare and Private Utility Nash Equilibrium Total competitiveness –> form of congestion and inefficient network usage => Coalition formation – Sharing of information – Social awareness

27 Coalition Formation – Types Coordinate downloads of files that have mutual interest for both of the clients Have a pool of the credits -> Share the credits Users will upload files – For gaining higher credit value – For participating in downloading hordes Users will download popular files to increase their social value ISP – Social welfare coordinators Malicious – Detecting them (Reputation System)

28 Peer to Peer – Simulation Analysis Architecture Design Problems Concrete implementation

29 Peer to Peer – An Example 1 Supply Node – 2 slots 2 Demand Nodes – 2 Slots All are connected via ISP by a 2 kb/s link (download and upload) The Supply is generated with 10 files Coordinated Vs Non Coordinated value

30 Peer to Peer – Suggested Twicking eMule (Server Based) eMule - Kademlia (Distributed) FreeNet

31 Peer to Peer – More Issues Security – Anonymously – Secretly – Authentication Legal Aspects Protocols

32 Related work eMule – Credit System eDonkey – Horde Downloading FreeNet – Secure Information distribution HTTP Proxies – File Caching

33 Conclusions Extending the protocols to enable cooperative behavior may benefit the users Coalitions may Increase the utilization of the network and loosen congestion May be extended to other settings - computational tasks

34 Future Expansions More simulation and extended protocols Reputation Systems – Improve Credit System – External Credit / Utility System Resource Allocation usages Coordinators – Users who coordinate efforts

35 Bibliography How Bad is Selfish Routing? By Tim Roughgarden and Eva Tardos, 2000 Competitive Routing in Multi-User Communication Networks By Ariel Orda, Raphael Rom, Nahum Shimki Worst-case Equilibria By Elias Koutsoupias and Christos Papadimitrio,1999 Tight Bounds for Worst-Case Equilibria By Tight Bounds for Worst-Case Equilibria, 2002 Game Theory – 3 rd edition, By Guillermo Owen, 1995

36 Related Sites eMule – http://www.emule-project.net/ http://www.emule-project.net/ FreeNet – http://freenet.sourceforge.net/ http://freenet.sourceforge.net/ Boost – http://www.boost.org/


Download ppt "Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein."

Similar presentations


Ads by Google