How Bad Is Selfish Routing?

Slides:



Advertisements
Similar presentations
Price Of Anarchy: Routing
Advertisements

C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Introduction to Algorithms
Course: Price of Anarchy Professor: Michal Feldman Student: Iddan Golomb 26/02/2014 Non-Atomic Selfish Routing.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
How should we define corner points? Under any reasonable definition, point x should be considered a corner point x What is a corner point?
1 Truthful Mechanism for Facility Allocation: A Characterization and Improvement of Approximation Ratio Pinyan Lu, MSR Asia Yajun Wang, MSR Asia Yuan Zhou,
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
MAXIMUM FLOW Max-Flow Min-Cut Theorem (Ford Fukerson’s Algorithm)
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Approximation Algorithm: Iterative Rounding Lecture 15: March 9.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
How Bad is Selfish Routing? Tim Roughgarden & Eva Tardos Presented by Wonhong Nam
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
The Price of Anarchy in a Network Pricing Game (II) SHI Xingang & JIA Lu
How bad is selfish routing? מאת ליאור עזרא עפ " י מאמר של חווה טרדוס וטים גן - מחוספס.
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Efficiency Loss in a Network Resource Allocation Game Paper by: Ramesh Johari, John N. Tsitsiklis [ Informs] Presented by: Gayatree Ganu.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
A Stronger Bound on Braess’s Paradox Henry Lin * Tim Roughgarden * Éva Tardos † *UC Berkeley † Cornell University.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
The Effectiveness of Stackelberg strategies and Tolls for Network Congestion Games Chaitanya Swamy University of Waterloo.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Approximating Market Equilibria Kamal Jain, Microsoft Research Mohammad Mahdian, MIT Amin Saberi, Georgia Tech.
Interaction of Overlay Networks: Properties and Implications Joe W.J. Jiang Dah-Ming Chiu John C.S. Lui The Chinese University of Hong Kong.
Max Flow – Min Cut Problem. Directed Graph Applications Shortest Path Problem (Shortest path from one point to another) Max Flow problems (Maximum material.
1 Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Stanford University.
Maximum Flow Problem (Thanks to Jim Orlin & MIT OCW)
Network Congestion Games
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
15.082J & 6.855J & ESD.78J October 7, 2010 Introduction to Maximum Flows.
15.082J and 6.855J March 4, 2003 Introduction to Maximum Flows.
Hon Wai Leong, NUS (CS6234, Spring 2009) Page 1 Copyright © 2009 by Leong Hon Wai CS6234: Lecture 4  Linear Programming  LP and Simplex Algorithm [PS82]-Ch2.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Potential Functions and the Inefficiency of Equilibria
Iterative Rounding in Graph Connectivity Problems Kamal Jain ex- Georgia Techie Microsoft Research Some slides borrowed from Lap Chi Lau.
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Minimum Cost Flow Algorithms and Networks. Algorithms and Networks: Minimum Cost Flow2 This lecture The minimum cost flow problem: statement and applications.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Equilibria of Atomic Flow Games are not Unique
Cycles and Paths vs functions
Congestion games Computational game theory Fall 2010
CSCI 3210: Computational Game Theory
Algorithms and Networks
Path Coupling And Approximate Counting
James B. Orlin Presented by Tal Kaminker
Introduction to Maximum Flows
Presented By Aaron Roth
3.4 Push-Relabel(Preflow-Push) Maximum Flow Alg.
On the effect of randomness on planted 3-coloring models
Flows and Networks Plan for today (lecture 6):
Problem Solving 4.
Selfish Routing 第3回
Selfish Load Balancing
Algorithms (2IL15) – Lecture 7
Algorithms and Networks
Lecture 21 Network Flow, Part 1
Existence of 3-factors in Star-free Graphs with High Connectivity
The Price of Routing Unsplittable Flow
Part 3. Linear Programming
Presentation transcript:

How Bad Is Selfish Routing? Dantong Ji University of Maryland April 19, 2018

Outline Worst Case For Linear Latency Functions Extensions

Worst Case For Linear Latency Functions Main Theorem (Theorem 4.5): If 𝐺, 𝑟, 𝑙 has linear latency functions, then 𝜌 𝐺, 𝑟, 𝑙 ≤ 4 3 Linear latency: 𝑙 𝑒 𝑥 = 𝑎 𝑒 𝑥+ 𝑏 𝑒 , where 𝑎 𝑒 , 𝑏 𝑒 ≥0. The bound is tight: recall the Braess’s Paradox! Proof sketch: 𝐶(𝑓) is the cost at Nash equilibrium. An optimal flow for 𝐺, 𝑟 2 , 𝑙 is at least 1 4 𝐶 𝑓 ; Augmenting from 𝐺, 𝑟 2 , 𝑙 to 𝐺, 𝑟, 𝑙 introduces at least 1 2 𝐶 𝑓 .

Lemmas Lemma 2.2: A flow 𝑓 feasible for instance (𝐺, 𝑟, 𝑙) is at Nash equilibrium if and only if for every 𝑖∈ 1, ⋯, 𝑘 and 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 with 𝑓 𝑃 1 >0, 𝑙 𝑝 1 𝑓 ≤ 𝑙 𝑝 2 𝑓 .

Lemmas Lemma 2.4: A flow 𝑓 is optimal for a convex program of the form (NLP) if and only if for every 𝑖∈ 1, ⋯, 𝑘 and 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 with 𝑓 𝑃 1 >0, 𝑐 𝑃 1 ′ 𝑓 ≤ 𝑐 𝑃 2 ′ 𝑓 . 𝑐 𝑒 𝑓 𝑒 = 𝑙 𝑒 𝑓 𝑒 𝑓 𝑒 (NLP) Min 𝑒∈𝐸 𝑐 𝑒 ( 𝑓 𝑒 ) s.t 𝑃∈ Ρ 𝑖 𝑓 𝑃 = 𝑟 𝑖 ∀𝑖∈ 1, ⋯,𝑘 𝑓 𝑒 = 𝑃∈ Ρ 𝑖 𝑓 𝑃 ∀𝑒∈𝐸 𝑓 𝑃 ≥0 ∀𝑃∈Ρ Intuitive: Move any bit of the flow in Ρ 𝑖 from the current path 𝑃 1 to another, will result in an increase in the cost.

Lemmas Lemma 2.2: A flow 𝑓 feasible for instance (𝐺, 𝑟, 𝑙) is at Nash equilibrium if and only if for every 𝑖∈ 1, ⋯, 𝑘 and 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 with 𝑓 𝑃 1 >0, 𝑙 𝑝 1 𝑓 ≤ 𝑙 𝑝 2 𝑓 . Lemma 2.4: A flow 𝑓 is optimal for a convex program of the form (NLP) if and only if for every 𝑖∈ 1, ⋯, 𝑘 and 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 with 𝑓 𝑃 1 >0, 𝑐 𝑃 1 ′ 𝑓 ≤ 𝑐 𝑃 2 ′ 𝑓 .

Lemmas Corollary 2.5: Let (𝐺, 𝑟, 𝑙) be an instance in which 𝑥⋅ 𝑙 𝑒 (𝑥) is a convex function for each edge 𝑒, with marginal cost functions 𝑙 ∗ . Then a flow 𝑓 feasible for (𝐺, 𝑟, 𝑙) is optimal if and only if it is at Nash equilibrium for the instance 𝐺, 𝑟, 𝑙 ∗ . Marginal cost functions 𝑙 ∗ : 𝑙 𝑒 ∗ 𝑓 𝑒 = 𝑙 𝑒 𝑓 𝑒 𝑓 𝑒 ′ = 𝑙 𝑒 𝑓 𝑒 + 𝑙 𝑒 ′ 𝑓 𝑒 𝑓 𝑒 .

Quick Refresh Main Theorem (Theorem 4.5): If 𝐺, 𝑟, 𝑙 has linear latency functions, then 𝜌 𝐺, 𝑟, 𝑙 ≤ 4 3 Linear latency: 𝑙 𝑒 𝑥 = 𝑎 𝑒 𝑥+ 𝑏 𝑒 , where 𝑎 𝑒 , 𝑏 𝑒 ≥0. 𝐶 𝑓 = 𝑒 𝑎 𝑒 𝑓 𝑒 2 + 𝑏 𝑒 𝑓 𝑒 𝑙 𝑒 ∗ 𝑥 =2 𝑎 𝑒 𝑥+ 𝑏 𝑒 . 𝑙 𝑒 𝑥 , 𝐶 𝑓 , 𝑙 𝑒 ∗ 𝑥 are all convex functions.

Lemmas Rewrite the linear version of the lemmas (Lemma 4.1): Let (𝐺, 𝑟, 𝑙) be an instance with edge latency functions 𝑙 𝑒 𝑥 = 𝑎 𝑒 𝑥+ 𝑏 𝑒 , ∀𝑒∈𝐸. Then, (a) a flow 𝑓 is at Nash equilibrium in 𝐺 if and only if for each source- sink pair 𝑖 and 𝑃, 𝑃′∈ Ρ 𝑖 with 𝑓 𝑃 >0, 𝑒∈𝑃 𝑎 𝑒 𝑓 𝑒 + 𝑏 𝑒 ≤ 𝑒∈𝑃′ 𝑎 𝑒 𝑓 𝑒 + 𝑏 𝑒 (b) a flow 𝑓 ∗ is optimal in 𝐺 if and only if for each source-sink pair 𝑖 and 𝑃, 𝑃′∈ Ρ 𝑖 with 𝑓 𝑃 ∗ >0, 𝑒∈𝑃 2𝑎 𝑒 𝑓 𝑒 ∗ + 𝑏 𝑒 ≤ 𝑒∈𝑃′ 2𝑎 𝑒 𝑓 𝑒 ∗ + 𝑏 𝑒

Lemmas Lemma 4.3: Suppose (𝐺, 𝑟, 𝑙) has linear latency functions and 𝑓 is a flow at Nash equilibrium. Then, (a) the flow 𝑓 2 is optimal for (𝐺, 𝑟 2 , 𝑙) ; (b) the marginal cost of increasing the flow on a path 𝑃 with respect to 𝑓 2 equals the latency of 𝑃 with respect to 𝑓. Proof: 𝐶 𝑓 = 𝑒 𝑎 𝑒 𝑓 𝑒 2 + 𝑏 𝑒 𝑓 𝑒 𝑙 𝑒 ∗ 𝑥 =2 𝑎 𝑒 𝑥+ 𝑏 𝑒 .

Worst Case For Linear Latency Functions Main Theorem (Theorem 4.5): If 𝐺, 𝑟, 𝑙 has linear latency functions, then 𝜌 𝐺, 𝑟, 𝑙 ≤ 4 3 Proof sketch: 𝐶(𝑓) is the cost at Nash equilibrium. S1: An optimal flow for 𝐺, 𝑟 2 , 𝑙 is at least 1 4 𝐶 𝑓 ; S2: Augmenting from 𝐺, 𝑟 2 , 𝑙 to 𝐺, 𝑟, 𝑙 introduces at least 1 2 𝐶 𝑓 . 𝑙 𝑒 𝑥 = 𝑎 𝑒 𝑥+ 𝑏 𝑒 , 𝐶 𝑓 = 𝑒 𝑎 𝑒 𝑓 𝑒 2 + 𝑏 𝑒 𝑓 𝑒 , 𝑙 𝑒 ∗ 𝑥 =2 𝑎 𝑒 𝑥+ 𝑏 𝑒 .

Worst Case For Linear Latency Functions-1 Step 1: An optimal flow for 𝐺, 𝑟 2 , 𝑙 is at least 1 4 𝐶 𝑓 . Proof: 𝐶 𝑓 2 = 𝑒 1 4 𝑎 𝑒 𝑓 2 2 + 1 2 𝑏 𝑒 𝑓 𝑒 ≥ 1 4 𝑒 𝑎 𝑒 𝑓 𝑒 2 + 𝑏 𝑒 𝑓 𝑒 = 1 4 𝐶 𝑓

Worst Case For Linear Latency Functions-2 Step 2: Augmenting from 𝐺, 𝑟 2 , 𝑙 to 𝐺, 𝑟, 𝑙 introduces at least 1 2 𝐶 𝑓 Lemma 4.4: Suppose 𝐺, 𝑟, 𝑙 is an instance with linear latency functions for which 𝑓 ∗ is an optimal flow. Let 𝐿 𝑖 ∗ ( 𝑓 ∗ ) be the minimum marginal cost of increasing flow on an 𝑠 𝑖 − 𝑡 𝑖 path with respect to 𝑓 ∗ . Then for any 𝛿>0, a feasible flow for the problem instance 𝐺, 1+𝛿 𝑟, 𝑙 has cost at least 𝐶 𝑓 ∗ +𝛿 𝑖=1 𝑘 𝐿 𝑖 ∗ 𝑓 ∗ 𝑟 𝑖

Worst Case For Linear Latency Functions-2 Proof of Lemma 4.4: Due to the convexity of the function 𝑥⋅ 𝑙 𝑒 𝑥 = 𝑎 𝑒 𝑥 2 + 𝑏 𝑒 𝑥 𝑙 𝑒 𝑓 𝑒 𝑓 𝑒 ≥ 𝑙 𝑒 𝑓 𝑒 ∗ 𝑓 𝑒 ∗ + 𝑓 𝑒 − 𝑓 𝑒 ∗ 𝑙 𝑒 ∗ ( 𝑓 𝑒 ∗ ) 𝐶 𝑓 = 𝑒∈𝐸 𝑙 𝑒 𝑓 𝑒 𝑓 𝑒 ≥ 𝑒∈𝐸 𝑙 𝑒 𝑓 𝑒 ∗ 𝑓 𝑒 ∗ + 𝑒∈𝐸 𝑓 𝑒 −𝑓 𝑒 ∗ 𝑙 𝑒 (𝑓 𝑒 ∗ ) =𝐶 𝑓 ∗ + 𝑖=1 𝑘 𝑃∈ Ρ 𝑖 𝑙 𝑃 ∗ 𝑓 ∗ ( 𝑓 𝑃 − 𝑓 𝑃 ∗ )

Worst Case For Linear Latency Functions-2 𝐶 𝑓 ≥𝐶 𝑓 ∗ + 𝑖=1 𝑘 𝑃∈ Ρ 𝑖 𝑙 𝑃 ∗ 𝑓 ∗ ( 𝑓 𝑃 − 𝑓 𝑃 ∗ ) ≥𝐶 𝑓 ∗ + 𝑖=1 𝑘 𝐿 𝑖 ∗ ( 𝑓 ∗ ) 𝑃∈ Ρ 𝑖 ( 𝑓 𝑃 − 𝑓 𝑃 ∗ ) =𝐶 𝑓 ∗ +𝛿 𝑖=1 𝑘 𝐿 𝑖 ∗ 𝑓 ∗ 𝑟 𝑖 ■

Worst Case For Linear Latency Functions-2 Lemma 4.4 -> Augmenting from 𝐺, 𝑟 2 , 𝑙 to 𝐺, 𝑟, 𝑙 introduces at least 1 2 𝐶 𝑓 Proof: 𝐶 𝑓 ∗ ≥𝐶 𝑓 2 + 𝑖 𝑘 𝐿 𝑖 ∗ 𝑓 2 𝑟 𝑖 2 =𝐶 𝑓 2 + 1 2 𝑖 𝑘 𝐿 𝑖 𝑓 𝑟 𝑖 =𝐶 𝑓 2 + 1 2 𝐶 𝑓 ■

Extensions Assumption: These assumptions do not always hold. Agents have full information of the latency of different paths. Infinitely many agents, each controlling a negligible fraction of the traffic. These assumptions do not always hold. Approximate Nash Equilibrium Finite Splittable Flow Finite Unsplittalbe Flow

Approximate Nash Equilibrium No full information. Agents can only sense the difference if it is significant. Definition 5.1: A flow 𝑓 feasible for instance (𝐺, 𝑟, 𝑙) is at 𝜖- approximate Nash equilibrium if for all 𝑖∈ 1, ⋯, 𝑘 , 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 , and 𝛿∈[0, 𝑓 𝑃 1 ], we have 𝑙 𝑃 1 𝑓 ≤ 1+𝜖 𝑙 𝑃 2 ( 𝑓 ), where 𝑓 𝑃 −𝛿 𝑖𝑓 𝑃= 𝑃 1 𝑓 𝑃 +𝛿 𝑖𝑓 𝑃= 𝑃 2 𝑓 𝑃 𝑖𝑓 𝑃∉{ 𝑃 1 , 𝑃 2 }

Approximate Nash Equilibrium Lemma 5.2: A flow 𝑓 is at 𝜖-approximate Nash equilibrium if and only if for every 𝑖∈ 1,⋯,𝑘 and 𝑃 1 , 𝑃 2 ∈ Ρ 𝑖 with 𝑓 𝑃 1 >0, 𝑙 𝑃 1 𝑓 ≤ 1+𝜖 𝑙 𝑃 2 𝑓 . Theorem 5.3: If 𝑓 is at 𝜖-approximate Nash equilibrium with 𝜖<1 for 𝐺, 𝑟, 𝑙 and 𝑓 ∗ is feasible for 𝐺, 2𝑟, 𝑙 , then 𝐶 𝑓 ≤ 1+𝜖 1−𝜖 𝐶 𝑓 ∗ .

Finite Splittable Flow Model: We have 𝑘 agents. Agent 𝑖 intends to send 𝑟 𝑖 through 𝑠 𝑖 − 𝑡 𝑖 . Agents can send the flow through multiple paths. A flow 𝑓= 𝑓 1 ,⋯, 𝑓 𝑘 , with 𝑓 (𝑖) : 𝑃 𝑖 → ℛ + . The cost of agent 𝑖 is C 𝑖 𝑓 = 𝑃∈ Ρ 𝑖 𝑙 𝑃 𝑓 𝑓 𝑃 (𝑖) . Theorem 5.4: If 𝑓 is at Nash equilibrium for the finite splittable instance 𝐺, 𝑟, 𝑙 with 𝑥⋅ 𝑙 𝑒 𝑥 convex for each 𝑒, and 𝑓 ∗ is feasible for the finite splittable instance 𝐺, 2𝑟, 𝑙 , then 𝐶 𝑓 ≤𝐶 𝑓 ∗ .

Finite Unsplittable Flow Model: The same as finite splittable case, except for that agents must route its flow on a single path. No general bicriteria result for unsplittable flow! If agents do not control too much flow, and the edge latency functions are not too steep, similar result holds. Theorem 5.5: Suppose 𝑓 is at Nash equilibrium in the finite unsplittable instance 𝐺, 𝑟, 𝑙 , and for some 𝛼<2, we have 𝑙 𝑒 𝑥+ 𝑟 𝑖 ≤𝛼⋅ 𝑙 𝑒 (𝑥) for all agents 𝑖∈ 1,⋯,𝑘 , edges 𝑒∈𝐸, and 𝑥∈[0, 𝑗≠𝑖 𝑟 𝑗 ]. Then for any flow 𝑓 ∗ feasible for 𝐺, 2𝑟, 𝑙 , 𝐶 𝑓 ≤ 𝛼 2−𝛼 ⋅𝐶 𝑓 ∗ .

Thanks!