Peter Bulychev Alexandre David Kim G. Larsen Marius Mikucionis TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A.

Slides:



Advertisements
Similar presentations
Solving Timed Games with Variable Observations: Proof of Concept Peter Bulychev Franck Cassez Alexandre David Kim G. Larsen Jean-François Raskin Pierre-Alain.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
A Lyapunov Optimization Approach to Repeated Stochastic Games Michael J. Neely University of Southern California Proc.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Opersating Mode DCF: distributed coordination function
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Analysis of Ethernet-like protocols Andrey Lukyanenko University of Kuopio.
Toward Optimal Utilization of Shared Random Access Channels Joseph (Seffi) Naor, Technion Danny Raz, Technion Gabriel Scalosub, University of Toronto.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
Chapter 4: Medium Access Control (MAC) Sublayer
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Kim G. Larsen Peter Bulychev, Alexandre David, Dehui Du, Axel Legay, Guangyuan Li, Marius Mikucionis, Danny B. Poulsen, Amalie Stainer, Zheng Wang TexPoint.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
1 Multi-radio Channel Allocation in Competitive Wireless Networks Mark Felegyhazi, Mario Čagalj, Jean-Pierre Hubaux EPFL, Switzerland IBC’06, Lisbon, Portugal.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
PDEVS Protocol Performance Prediction using Activity Patterns with Finite Probabilistic DEVS DEMO L. Capocchi, J.F. Santucci, B.P. Zeigler University of.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Medium Access Control Protocols
Monitoring Churn in Wireless Networks
Net301 lecture9 11/5/2015 Lect 9 NET301.
CS 154, Lecture 6: Communication Complexity
TexPoint fonts used in EMF.
The Medium Access Control Sublayer
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol.
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Peter Bulychev Alexandre David Kim G. Larsen Marius Mikucionis TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A AA AA AA Computing Nash Equilibrium in Wireless Ad Hoc Networks Using Statistical Model Checking

Nash Eq in Wireless Ad Hoc Networks Consider a wireless network, where there is a master node that chooses the optimal parameters that should be used by other nodes power=20% Peter Bulychev [2] GASICS 2011 Master node

Nash Eq in Wireless Ad Hoc Networks Now, if there are selfish nodes, they might want to change these parameters to achieve better performance power=20% power=80% Peter Bulychev[3] GASICS 2011 Master node

Nash Eq in Wireless Ad Hoc Networks Now, if there are selfish nodes, they might want to change these parameters to achieve better performance power=20% power=90% power=80% Peter Bulychev [4] GASICS 2011 We say that network configuration satisfies Nash equilibrium if it's not profitable for a node to alter its behavior to the detriment of other nodes Master node

Nash Eq in Wireless Ad Hoc Networks power=40% Peter Bulychev[5] GASICS 2011

Problem statement GASICS 2011 Peter Bulychev[6]  Input: 1.Each node is modeled by a parameterized Priced Timed Automata M(p), where p∈P and P is finite 2.System of N nodes is modeled by S(p 1, p 2, …, p N ) ≡ M(p 1 )||M(p 2 )||…||M(p N )||C 3.Each node k has a goal φ k (i.e. to transmit a message within given timed and energy bounds) 4.Utility function of a node k is defined as a probability that φ k is satisfied by a random run: U k (p 1, p 2, …, p k ) ≡ Pr[S(p 1, p 2, …, p k ) ⊨ φ k ]  Goal:  To find symmetric NE, i.e. to find p∈P s.t.: ∀ p’ ∈ P ⋅ U 1 (p, p, …, p)≥ U 1 (p’, p, …, p)

Problem statement GASICS 2011 Peter Bulychev[7]  Input: 1.Each node is modeled by a parameterized Priced Timed Automata M(p), where p∈P and P is finite 2.System of K nodes is modeled by S(p 1, p 2, …, p k ) ≡ M(p 1 )||M(p 2 )||…||M(p k )||C 3.Each node k has a goal φ k (i.e. to transmit a message within given timed and energy bounds) 4.Utility function of a node k is defined as a probability that φ k is satisfied by a random run: U k (p 1, p 2, …, p k ) ≡ Pr[S(p 1, p 2, …, p k ) ⊨ φ k ]  Goal:  To find symmetric NE, i.e. to find p∈P s.t.: ∀ p’ ∈ P ⋅ U 1 (p, p, …, p)≥ U 1 (p’, p, …, p) Nash Equilibrium might not exist in non-mixed strategies Thus, we will consider a relaxed definition of Nash Equilibrium

Problem statement GASICS 2011 Peter Bulychev[8]  Input: 1.Each node is modeled by a parameterized Priced Timed Automata M(p), where p∈P and P is finite 2.System of K nodes is modeled by S(p 1, p 2, …, p k ) ≡ M(p 1 )||M(p 2 )||…||M(p k )||C 3.Each node k has a goal φ k (i.e. to transmit a message within given timed and energy bounds) 4.Utility function of a node k is defined as a probability that φ k is satisfied by a random run: U k (p 1, p 2, …, p k ) ≡ Pr[S(p 1, p 2, …, p k ) ⊨ φ k ]  Goal:  To find symmetric δ-relaxed NE, i.e. to find p∈P s.t.: ∀ p’ ∈ P ⋅ U 1 (p, p, …, p)≥ δ* U 1 (p’, p, …, p)

Related work GASICS 2011 Peter Bulychev[9]  Pioneering work: “Game theory and the design of self-configuring, adaptive wireless networks”, MacKenzie et.al.,  Survey: “Using game theory to analyze wireless ad hoc networks”, Srivastava et.al.,  Most of the papers use pure simulation (1) or analytical-based (2) approaches: (1) doesn’t provide confidence on its results (2) doesn’t scale to complex models  What can we propose?

Our SMC-based approach GASICS 2011 Peter Bulychev[10] SMC = Simulation + Statistics Scales to complex models Can provide confidence on its results

Our SMC-based approach GASICS 2011 Peter Bulychev11]  First, we use simulation-based algorithm to find a strategy p that is a good candidate for δ-relaxed NE for as large δ as it is possible  Then we apply statistics to compute δ s.t. we can accept the hypothesis that p is a δ-relaxed NE with a given significance level α

SMC-based approach (Part I) Input: P – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Algorithm: 1.for every p ∊ P compute estimation Ũ(p,p) 2.waiting := P 3.candidates := ∅ 4.while len(waiting)>1: 5. pick some unexplored pair (p’,p) ∊ P × waiting 6. compute estimation Ũ(p’, p) 7. if Ũ(p, p)/Ũ(p’, p) < d: 8. remove p from waiting 9. if ∀ p’ Ũ(p’, p) is already computed: 10. remove p from waiting 11. add p to candidates 12. return argmax p ∊ P min p’ ∊ P Ũ(p, p)/Ũ(p’, p) GASICS 2011 Peter Bulychev[12]

SMC-based approach (Part I) Input: P={p 1, p 2, …, p 10 } – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Ũ(p 1,p 1 )Ũ(p 10,p 1 ) Ũ(p 1,p 10 ) Ũ(p 10,p 10 ) Peter Bulychev[13] GASICS 2011

SMC-based approach (Part I) Peter Bulychev[14] GASICS 2011 Input: P={p 1, p 2, …, p 10 } – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Ũ(p 1,p 1 )Ũ(p 10,p 1 ) Ũ(p 1,p 10 ) Ũ(p 10,p 10 )

SMC-based approach (Part I) Ũ(p 8,p 8 ) ≥ d*Ũ(s 6,s 8 ) Ũ(p 6,p 6 ) < d*Ũ(p 3,p 6 ) Peter Bulychev[15] GASICS 2011 Input: P={p 1, p 2, …, p 10 } – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Ũ(p 1,p 1 )Ũ(p 10,p 1 ) Ũ(p 1,p 10 ) Ũ(p 10,p 10 )

SMC-based approach (Part I) Peter Bulychev[16] GASICS 2011 Input: P={p 1, p 2, …, p 10 } – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Ũ(p 1,p 1 )Ũ(p 10,p 1 ) Ũ(p 1,p 10 ) Ũ(p 10,p 10 ) Ũ(p 8,p 8 ) ≥ d*Ũ(s 6,s 8 )

SMC-based approach (Part I) Peter Bulychev[17] GASICS 2011 “ Embarrassingly Parallelizable” argmax p ∊ P min p’ ∊ P Ũ(p, p)/Ũ(p’, p) Input: P={p 1, p 2, …, p 10 } – finite set of strategies, U(p i, p k ) – utility function, d ∊ [0,1] - threshold Goal: find p ∊ P that maximizes min p’ ∊ P Ũ(p, p)/Ũ(p’, p)

SMC-based approach (Part II) Peter Bulychev[18] GASICS 2011 Ũ(p k,p k ) Ũ(p k+1,p k ) Ũ(p n,p k ) Ũ(p k-1,p k ) … Ũ(p 1,p k ) … By definition p k satisfies δ-relaxed NE iff ∀ i ∈ [1,n] ⋅ U(p k, p k )≥ δ* U(p i, p k ) Now we: 1.Reestimate each Ũ(p i, p k ) using N SMC runs 2.Apply the following theorem: Theorem. W e can accept the hypothesis that p k satisfies δ-relaxed NE with a given significance level α, if: … …

Implementation details Peter Bulychev[19] GASICS 2011 SSH connection Python frontend node 1 node 2 node 3 node 4 UPPAAL backend

Case studies GASICS 2011 Peter Bulychev[20] We used our tool to compute Nash Equilibrium for two CSMA (Carrier Sense Multiple Access) protocols: 1.k-persistent ALOHA CSMA/CD protocol 2.IEEE CSMA/CA protocol

Aloha CSMA/CD protocol  Simple random access protocol (based on p-persistent ALOHA)  several nodes sharing the same wireless medium  each node has always data to send, and it sends data after a random delay  in case of collision both stations wait for a random delay  delay has a geometrical distribution with parameter p=TransmitProb Peter Bulychev[21] GASICS 2011 Pr[Node.time (Node.Ok && Node.ntransmitted <= 5))

Value of utility function for the cheater node Results (3 nodes) Peter Bulychev[22] GASICS 2011

Results (Aloha) GASICS 2011 Peter Bulychev [23] N=2N=3N=4N=5N=6N=7N=8 Nash Eq The value of δ Ũ(s NE,s NE ) Opt Ũ(s opt, s opt ) Symmetric Nash Equilibrium and Optimal strategies for different number of network nodes #cores Time38m19m13m9m46s7m52s7m04s6m03s5m Time required to find Nash Equilibrium for N=3 100x100 parameter values (8xIntel Core2 2.66GHz CPU)

IEEE CSMA/CA protocol Peter Bulychev[24] GASICS 2011 nb:=0 be:=MinBE Delay for random(0..2 be ) UnitBackoffPeriod Channel is clear? nb:=nb+1 be:=min(be+1, MaxBE) nb>MaxNB? Failure Transmit Y N Y N Switch to transmitting IEEE CSMA/CA is based on the random backoff procedure We assume that a node can change its UnitBackoffPeriod parameter

IEEE CSMA/CA protocol Peter Bulychev [25] GASICS 2011 We tried to make our model realistic:  all the constant values have been taken from the ZigBee and IEEE standards  power consumption rates were taken from the specification of the real ZigBee chip (DACOM U- Power 500)

Results – 2 nodes Peter Bulychev [26] GASICS 2011 The Nash Equilibrium strategy here is trivial: UnitBackoffPeriod = 0 (transmit as soon as possible)

Coalitions GASICS 2011 Peter Bulychev [27]  No non-trivial NE strategy for the case 1xCheater VS NxHonest  Let’s think about coalitions: NxCheater VS NxHonest  This can correspond to the situation when several wireless devices belong to the same user. In this case it’s not profitable for a user if these devices compete with each other

Results – 2x2 nodes Peter Bulychev [28] GASICS 2011

Peter Bulychev [29] Number of nodes in one coalition N=1N=2N=3N=4N=5 Nash Eq The value of δ Ũ(s NE,s NE ) Opt Ũ(s opt, s opt ) Computation time1m08s5m45s7m62s32m49s57m59s Symmetric Nash Equilibrium and Optimal strategies for different number of network nodes in CSMA/CA

GASICS 2011 Kim Larsen [30] Questions?