Sharing the Cost of Multicast Transmissions J. Feigenbaum, C. Papadimitriou, S. Shenker Hong Zhang, CIS620, 4/24.

Slides:



Advertisements
Similar presentations
Communication requirements of VCG-like mechanisms in convex environments Ramesh Johari Stanford University Joint work with John N. Tsitsiklis, MIT.
Advertisements

4. Public Goods.
Variational Methods for Graphical Models Micheal I. Jordan Zoubin Ghahramani Tommi S. Jaakkola Lawrence K. Saul Presented by: Afsaneh Shirazi.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Exact Inference in Bayes Nets
Junction Trees And Belief Propagation. Junction Trees: Motivation What if we want to compute all marginals, not just one? Doing variable elimination for.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
1 Foundations of Distributed Algorithmic Mechanism Design Joan Feigenbaum Yale University
Distributed Multiagent Resource Allocation In Diminishing Marginal Return Domains Yoram Bachrach(Hebew University) Jeffrey S. Rosenschein (Hebrew University)
The Algorithmic Structure of Group Strategyproof Budget- Balanced Cost-Sharing Mechanisms Paolo Penna & Carmine Ventre Università di Salerno Italy.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks John C.S. Lui The Chinese University of Hong Kong Joint work.
CS Dept, City Univ.1 Low Latency Broadcast in Multi-Rate Wireless Mesh Networks LUO Hongbo.
Strategyproof Sharing of submodular costs: Budget Balance Vs. Efficiency Liad Blumrosen May 2001.
Price of Anarchy, and Strategyproof Network Protocol Design Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Collaborated.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Charge-Sensitive TCP and Rate Control Richard J. La Department of EECS UC Berkeley November 22, 1999.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno, WP2.
14 Oct 03Cost sharing & Approximation1 Group strategy proof mechanisms via primal-dual algorithms (Cost Sharing) Martin PálÉva Tardos.
Multicast Networks Profit Maximization and Strategyproofness David Kitchin, Amitabh Sinha Shuchi Chawla, Uday Rajan, Ramamoorthi Ravi ALADDIN Carnegie.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
More Powerful and Simpler Cost-Sharing Methods Carmine Ventre Joint work with Paolo Penna University of Salerno.
Group Strategyproofness and No Subsidy via LP-Duality By Kamal Jain and Vijay V. Vazirani.
SECOND PART: Algorithmic Mechanism Design. Implementation theory Imagine a “planner” who develops criteria for social welfare, but cannot enforce the.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno.
Consumers, Producers, and the Efficiency of Markets Outline:  Positive economics: Allocation of scarce resources using forces of demand and supply  Normative.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Sharing the Cost of Multicast Transmissions Joan Feigenbaum Christos H. Papadimitriou Scott Shenker Conference version: STOC 2000 Journal version: JCSS.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
22/6/04Seminar on Algorithmic Game Theory 1 Pal-Tardos Mechanism.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Optimal Partition of QoS Requirements on Unicast Paths and Multicast Trees Dean H.Lorenz and Ariel Orda Department of Electrical Engineering Technion –
1 A BGP-based Mechanism for Lowest-Cost Routing Rahul Sami Yale University Joint work with: Joan Feigenbaum Yale Christos.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective Jian Li Texas A&M University April 30 th, 2015 Jointly with R.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Exploiting Physical Layer Advances in Wireless Networks Michael Honig Department of EECS Northwestern University.
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Multicast Scheduling in Cellular Data Networks Katherine Guo, Arun Netravali, Krishan Sabnani Bell-Labs Research Hyungsuk Won, Han Cai, Do Young Eun, Injong.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Charitable donations, public goods, cost sharing Vincent Conitzer
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Consumer Choice and Utility Maximization 1. Would you see the movie three times? Notice that the total benefit is more than the total cost but you would.
Starting at Binary Trees
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
2) Combinatorial Algorithms for Traditional Market Models Vijay V. Vazirani.
Exact Inference in Bayes Nets. Notation U: set of nodes in a graph X i : random variable associated with node i π i : parents of node i Joint probability:
Binary Search Trees (BST)
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
12 Sep 03Martin Pál: Cost sharing & Approx1 Cost Sharing and Approximation Martin Pál joint work with Éva Tardos A-exam.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Free-Riders in Steiner Tree Cost-Sharing Games Paolo Penna and Carmine Ventre Università di Salerno.
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
Chapter 6 – Trees. Notice that in a tree, there is exactly one path from the root to each node.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
AA Trees.
Sections 8.7 – 8.8 Balancing a Binary Search Tree.
Christos H. Papadimitriou UC Berkeley
ECE 544 Protocol Design Project 2016
Search Sorted Array: Binary Search Linked List: Linear Search
Chapter 7: Consumer & Producer Surplus
Algorithmic Problems Related To The Internet
Welfare Economics Part II
Combinatorial Optimization of Multicast Key Management
Search Sorted Array: Binary Search Linked List: Linear Search
Presentation transcript:

Sharing the Cost of Multicast Transmissions J. Feigenbaum, C. Papadimitriou, S. Shenker Hong Zhang, CIS620, 4/24

Problem Outline  S,  1, …,  6 : Network Nodes 33 SS 11 55 66 22 44

Problem Outline 33 SS 11 55 66 22 44 Live Concert, Movie, etc.

Problem Outline 33 SS 11 55 66 22 44 : Users

Problem Outline 33 SS 11 55 66 22 4 Network Link Costs Users’ Utilities

Problem Outline 33 SS 11 55 66 22 4 Unicast vs. Multicast

Problem Outline 33 SS 11 55 66 22 4 Which users receive services? 2.How much do receivers pay?

Problem Notations (1) N = {  S,  1,  2, …,  n }: Set of network nodes. L: Set of bi-directional network links. P = {1, 2, … i, …, p }: The user population. u i : User i ‘s utility.  i : User i receives service (  i = 1) or not (  i = 0). x i : User i ‘s shared cost. w i : User i ‘s individual welfare ( w i =  i u i – x i ). Unknown

Assumption 0: Multicast Tree 33 SS 11 55 66 22 4 Source T( i ): fixed path from source to i Simplify problem

Problem Notations (2) N, L, P, u i,  i, x i, w i =  i u i – x i. R  P: Receiver set Construct a multicast tree T(R) =  i  R T( i )  L c(T(R)): The cost of the tree T(R) reaching R, c(T(R)) =  l  T(R) c( l ) Total Welfare NW(R) = u R – c(T(R)) = Σ i  R u i – c(T(R))

Assumptions 0. Nondecreasing: c(T(R + i ))  c(T(R)) Submodular: c(T(R 1 ))+c(T(R 2 ))  c(T(R 1  R 2 )) + c(T(R 1  R 2 )) 1.No Positive Transfers (NPT): shared costs are positive ( x i ( u )  0 ) 2.Voluntary Participation (VP): reporting u i = 0 ensures  i = 0 ( w i ( u )  0 ) 3.Consumer Sovereignty (CS): reporting a high u i ensures  i = 1

Incentive Compatible Strategyproof mechanism –Telling the true u i is a dominant straegy for any user.  u, u i ', w i ( u 1, u 2, … u i, …, u p )  w i ( u 1, u 2, … u i ', …, u p )

Desired Properties Under incentive compatible mechanism Budget Balance:  i  P x i = c(T(R)) –The money raised from receivers covers the cost of transmission exactly. Efficiency: NW(R * ) = [ u R – c(T(R)) ] –The receiver set maximizes the overall benefit of the network. Notice Total Welfare (NW(R)) and Efficiency does not depend on shared costs x i

Desired Properties - Example Source 3, 32, 42, Source 3, 32, 42, Source 3, 32, 42, Budget Balanced Link Cost Utility Shared Cost Efficiency Source 3, 32, 42,

Desired Properties Under incentive compatible (strategyproof) mechanism Budget Balance & Efficiency are mutually exclusive. Only one strategyproof cost-sharing mechanism is efficient: Marginal Cost Mechanism. –Maximize overall benefit. There are many possible mechanisms for budget balance, among which the most efficient one: Shapley Value Mechanism. –Cover the cost.

Marginal Cost Mechanism R*( u ): The largest efficient receiver set W( u ) = NW(R*( u )) Each receiver pays marginal cost: x i = u i  i ( u ) – (W( u ) – W( u | u i = 0)) Source 3, 34, 22, , 1 3 3, 1 Link Cost Utility Shared Cost

Marginal Cost Mechanism Theorem 3.1, MC cost sharing requires exactly two messages per link. W  ( u ) : welfare from the subtree rooted at  W  ( u ) = u  + [  W  ( u ) ] - c  –child(  ) is all the child nodes in the subtree –u  is the sum of the utilities of the user in  –C  the cost of the link between  and its parent Source 14 2  child(  ) | W  (u)  0 3, 34, 22, C  = 3 

Marginal Cost Mechanism If W  ( u )  0, then  i ( u ) = 1; else  i ( u ) = 0. y i ( u ) = min w  ( u ) If u i  y i ( u ), then x i ( u ) = 0; If u i  y i ( u ), then x i ( u ) = u i - y i ( u ), ;  node on the path from i to the root Source , 34, C  = 3  1, 13, 1 2, 2 5

Marginal Cost Mechanism Exactly 2 messages per link 1. Bottom Up: Calculate W  ( u ) for each node. 2. Top Down: Propagate  i ( u ) y i ( u ) and x i ( u ), allocation and cost. Source , 34, C  = 3  1, 13, 1 2, 2 5

Shapley Value Mechanism The cost of a link l is shared equally by all receivers who are downstream of the link. Receiver set is the largest possible. Source 3, 34, 12, Link Cost Utility Shared Cost

Shapley Value Mechanism In each iteration, users with u i < x i are dropped and other users’ prices are recomputed

Shapley Value Mechanism n = | Network Nodes |; p = | Population | Theorem 5.1, The algorithm (brute-force) requires O( n  p ) message exchanges. Theorem 5.2, There is an infinite family of multicast computations, with n nodes and O( n ) users, such that any linear distributed algorithm that implements the SH mechanism requires in the worst case O( n 2 ) message exchanges

Conclusion Sharing multicast cost No Positive Transfers, Voluntary Participation, and Consumer Sovereignty Strategyproof (incentive compatible) mechanism Efficiency vs. Budget Balance Marginal Cost – Efficiency, 2 Messages Implementing, but Budget Deficit Shapley Value – Budget Balanced, O( n 2 ) Complexity, Feasible Problem