Best Response Dynamics in Multicast Cost Sharing

Slides:



Advertisements
Similar presentations
Unit-iv.
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Analysis of Algorithms
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Algorithms for Geometric Covering and Piercing Problems Robert Fraser PhD defence Nov. 23, 2012.
Selfish Flows over Time Umang Bhaskar, Lisa Fleischer Dartmouth College Elliot Anshelevich Rensselaer Polytechnic Institute.
1 Outline relationship among topics secrets LP with upper bounds by Simplex method basic feasible solution (BFS) by Simplex method for bounded variables.
Chapter 4: Informed Heuristic Search
IBM LP Rounding using Fractional Local Ratio Reuven Bar-Yehuda
Recurrences : 1 Chapter 3. Growth of function Chapter 4. Recurrences.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
1 Atomic Routing Games on Maximum Congestion Costas Busch Department of Computer Science Louisiana State University Collaborators: Rajgopal Kannan, LSU.
Shadow Prices vs. Vickrey Prices in Multipath Routing Parthasarathy Ramanujam, Zongpeng Li and Lisa Higham University of Calgary Presented by Ajay Gopinathan.
The Weighted Proportional Resource Allocation Milan Vojnović Microsoft Research Joint work with Thành Nguyen Microsoft Research Asia, Beijing, April, 2011.
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
THE PRICE OF STOCHASTIC ANARCHY Christine ChungUniversity of Pittsburgh Katrina LigettCarnegie Mellon University Kirk PruhsUniversity of Pittsburgh Aaron.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Introduction to Feedback Systems / Önder YÜKSEL Bode plots 1 Frequency response:
Online Node-weighted Steiner Connectivity Problems Vahid Liaghat University of Maryland MohammadTaghi Hajiaghayi (UMD) Debmalya Panigrahi (Duke) 1.
Algorithmic mechanism design Vincent Conitzer
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
1 Undirected Graphical Models Graphical Models – Carlos Guestrin Carnegie Mellon University October 29 th, 2008 Readings: K&F: 4.1, 4.2, 4.3, 4.4,
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Price of Stability Li Jian Fudan University May, 8 th,2007 Introduction to.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Minimum Vertex Cover in Rectangle Graphs
IMIM v v v v v v v v v DEFINITION L v 11 v 2 1 v 31 v 12 v 2 2 v 32.
Price Of Anarchy: Routing
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Strategic Network Formation and Group Formation Elliot Anshelevich Rensselaer Polytechnic Institute (RPI)
Computational Game Theory
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
The Price Of Stability for Network Design with Fair Cost Allocation Elliot Anshelevich, Anirban Dasgupta, Jon Kleinberg, Eva Tardos, Tom Wexler, Tim Roughgarden.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
How Bad is Selfish Routing? Tim Roughgarden & Eva Tardos Presented by Wonhong Nam
On the Price of Stability for Designing Undirected Networks with Fair Cost Allocations M.Sc. Thesis Defense Svetlana Olonetsky.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Potential games, Congestion games Computational game theory Spring 2010 Adapting slides by Michal Feldman TexPoint fonts used in EMF. Read the TexPoint.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
Connections between Learning Theory, Game Theory, and Optimization Maria Florina (Nina) Balcan Lecture 14, October 7 th 2010.
On Cost Sharing Mechanisms in the Network Design Game Rohit Khandekar IBM Watson Joint work with Baruch Awerbuch JHU TexPoint fonts used in EMF. Read the.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
1 Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Stanford University.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Improved Equilibria via Public Service Advertising Maria-Florina Balcan TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Vasilis Syrgkanis Cornell University
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
On a Network Creation Game
Online Multicast with Egalitarian Cost Sharing
Network Creation Game A. Fabrikant, A. Luthra, E. Maneva,
Network Formation Games
The Price of Routing Unsplittable Flow
Network Formation Games
Presentation transcript:

Best Response Dynamics in Multicast Cost Sharing Seffi Naor Microsoft Research and Technion Based on papers with: C. Chekuri, J. Chuzhoy, L. Lewin-Eytan, and A. Orda [EC 2006] M. Charikar, C. Mattieu, H. Karloff, M. Saks [2007] TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAA

Motivation Traditional networks – single entity, single control objective. Modern networking – many entities, different parties. Users act selfishly, maximizing their objective function. Decisions of each user are based on the state of the network, which depends on the behavior of the other users.  non-cooperative network games.

Our Framework A network shared by a finite number of users. Each edge has a fixed cost. Cost sharing method defines the rules of the game: determines the mutual influence between players. Performance of a user is total payment = sum of payments for all the edges it uses. Two fundamental models: The congestion model. The cost sharing model.

Common in unicast routing. Edge cost: Congestion Model Cost Sharing Model Common in unicast routing. Edge cost: Modeled by a load dependent function. Non-decreasing in the total flow of the edge. Each user has a negative effect on the performance of other users. Common in multicast routing. Fixed cost Cost sharing mechanism determines how the cost is shared by the users. Each user has a favorable effect on the performance of other users (cross monotonicty). In both models: Each user routes its traffic over a minimum-cost path. Splittable routing model vs. unsplittable routing model.

The Multicast Game A special root node r, and a set of n receivers (players). A player’s strategy is a routing decision – the choice of a single path to r. Egalitarian (Shapley( cost sharing mechanism: the cost of each edge is evenly split among the players using it. Each player on edge e with ne players pays: ce / ne The goal of the players is to connect to the root by making a routing decision minimizing their payment.

The Multicast Game Two different models: The integral model: each player connects to the root through a single path. The fractional model: each player is allowed to split its connection to the root into several paths (fractions add up to 1).

Nash Equilibrium Players are rational. Each player knows the rules of the underlying game. Nash Equilibrium: no player can unilaterally improve its cost by changing its path to the root. Cost of a path takes into account cost sharing. Nash equilibrium solutions are stable operating points.

The Price of Anarchy Nash equilibrium outcomes do not necessarily optimize the overall network performance. Price of Anarchy: The ratio between the cost of the worst Nash equilibrium and the (social) optimum. Quantifies the “penalty” incurred by lack of cooperation.

The Integral Multicast Game Potential function Φ of a solution T [Rosenthal `73]: Exact potential: change in cost of a connection of player i to the root is equal to the change in the potential Φ. If edge e is deleted from T: Φ = Φ - ce / ne(T) If edge e is added to T: Φ = Φ + ce / (ne(T)+1)

The Integral Multicast Game Finite strategy space  Φ has an optimal value. Φ  Nash equilibrium existence. Global / Local optima of Φ correspond to a NE. A Nash equilibrium solution is a tree rooted at r spanning the players. Special case of a congestion game.

Price of Anarchy vs. Price of Stability Price of anarchy can be as bad as (n). Price of stability – ratio between the cost of best Nash solution to the cost of OPT. Outcome of scenarios in the ‘middle ground’ between centrally enforced solutions and non-cooperative games. E.g.: central entity can enforce the initial operating point. [Anshelevich et al., FOCS 2004] Directed graphs - price of stability is θ(log n). Undirected graphs – upper bound on the price of stability is O(log n). PoS can be reached from a 2-approximate Steiner tree configuration: C(TNash)  Φ(TNash)  Φ(T2-Seiner)  log n ∙C (T2-Steiner) r t

Best Response Dynamics Each player, in its turn, selects a path minimizing its cost (best response). Eventually, an equilibrium point is reached. PoA strongly depends on the choice of the initial configuration. Starting from a near-optimal solution may be hard to enforce: requires relying on a central trusted authority. Question: What happens if we start from an empty configuration? [Chekuri, Chuzhoy, Lewin-Eytan, Naor, and Orda, EC 2006] Round 1: Players arrive one by one, each player plays best response. Round 2: Best response dynamics continue in arbitrary order till NE. Question: Can a good equilibrium always be achieved as a consequence of best-response dynamics in this model?

… Can a good equilibrium be achieved as a consequence Cost of user 1: c (r, x, 1) = 1+ε c (r , 1) = 1 r r r r r r r r r r Greedy cost of 3, … ,n = 1 Cost of user 2: c (r , x, 2) = 1+ε c (r, 1, x, 2 ) = 1+2ε c (r, 2) = 1 1 1 3/4 1 1 1 1 x x x x x x x x x x x x x x x ¼ + ε ¼ + ε ¼ + ε ¼ + ε … 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 n n-2 n-1 Price of anarchy = 4 Can a good equilibrium be achieved as a consequence of best-response dynamics?

Results The integral multicast game for undirected graphs: Upper bound of O(log3n) on the PoA of best-response dynamics in the two-round game starting from an “empty” configuration. (Improving over the bound of [CCLNO-EC06] of .) Upper bound of O(log2+ n) on the cost of the solution at the end of the first round. Lower bound of (log n) on the PoA of this game. Computing a Nash equilibrium minimizing Rosenthal’s potential function is NP-hard.

Price of Anarchy: Lower Bound Theorem: Price of anarchy of our game ¸ (logn). Proof: Adaptation of lower bound proof for the online Steiner problem [Imaze&Waxman] Online Steiner problem: used edges have cost 0 Take hard instance [IW] and replace each terminal by a star of n2 + 1 terminals at zero distance The n2 + 1 terminals choose the same path to root cost of used edge becomes negligible

PoA in Undirected Graphs: Upper Bound Analysis is performed in two steps: Round 1: players connect one by one to the root via best response. Solution T is reached after a sequence of arrivals t1 , t2 ,…, tn . We show:  O(log3n )∙ c(TOPT ) c(T) · O(log2+ n )∙ c(TOPT ) Round 2: players play in arbitrary order till NE is reached. c(TNash)  Φ(TNash)  Φ(T)

The First Round Choose a threshold  2 (0,1). Terminal t is -good if cost of next terminal using the same path as t · (1-) ¢ cost(t). Otherwise, terminal t is -bad. Idea: bound separately the contribution to Φ of the -good terminals and the -bad terminals.

Charging -good Terminals Suppose there is a tree T’ spanning the -good terminals. Upon arrival t pays: cost(t) Upon arrival, t’ pays at most: cost(t’)  d + (1-) ¢ cost(t) cost(t) t t’ d t and t’ are -good terminals t arrives first, then t’ arrives

Charging -good Terminals (contd.) Charges decay at an exponential rate along a root – leaf path in T’ Upon arrival of ti it pays at most: cost(ti) · di + (1-)¢cost(ti-1) cost(tk) · dk + dk-1(1-) + dk-2(1-)2 + … + d1(1-)k-1 r d1 t1 d2 t2 d3 t3 d4 t4 dk tk The charge to each edge e 2 T’: · d(e) ¢ i (1-)i ¢ ne(i) t1,…, tk are -good terminals arrival order: t1,…, tk

Auxiliary Tree TOPT is transformed to an auxiliary tree T’ defined on the set of -good terminals: The descendants of terminal t in T’ are terminals which have arrived after t. c(T’) · O(1/ ¢ logn) ¢ c(TOPT ) The depth of T’ · O(1/ ¢ logn)

Contribution of -good Terminals Theorem: The contribution of the -good terminals to Φ in the first phase is bounded as follows: Proof: Follows from the properties of T’ together with the exponential decay of the charges to the edges of T’ of the -good terminals.

Contribution of -bad Terminals Theorem: The contribution of the -bad terminals to Φ in the first phase is bounded as follows: Intuition: The cost of the edges “opened” for the first time by -bad terminals constitutes only a small part of the sum of the costs of the -bad paths. Setting  = O(1/logn) O(log4n ) upper bound on PoA Setting  cleverly O(log3n ) upper bound on PoA

The Fractional Multicast Game Players split their connection to the source. A splittable multicast model. r Flow on (r, y): ¼ unit of flow is shared by users 1 & 2. ½ unit of flow is used only by user 2. Flow on (r, x): ¼ unit of flow is shared by users 1 & 2. ½ unit of flow is used only by user 1. 3/4 3/4 1/4 1/4 x y 1 2

The Fractional Multicast Game The cost of each flow fraction is split evenly between its users.  ce·fe,n_e is the total cost of edge e. fe,1 = 1/4 fe,2 = 3/4 fe,3 = 7/8 1/4 3/4 7/8 Total cost of user 3: ce· (1/12 + 1/4 + 1/8).

The Fractional Multicast Game The potential function Φ of the fractional model: Φ is an exact potential. A fractional flow configuration defining a local minimum of Φ corresponds to a NE.

Results: Fractional Multicast Game Nash equilibrium existence. NE - minimizing the potential function: Can be computed in polynomial time (using LP). It is NP-hard in the case of an integral Nash. PoA of the computed NE is O(log n).

Computing a Minimum Potential NE Create a new graph G’ = (V, E’) by replacing each edge e by n copies e1, e2, …, en. Copy ej : “should” be used if j players use edge e. The cost of a unit flow on copy j of edge e is ce / j. The undirected graph is replaced by a directed flow network.

Computing a Minimum Potential NE The linear program: Objective function = potential function: The capacity of edge ej is 0  xe_j  1. Variables of the LP: Flows of the users on the edges ejE’. Capacities of the edges in E’. Constraints: Non-aggregating flow constraint: (flow of user i on ej )  xe_j . Aggregating flow constraint: (total flow on ej ) = j ∙ xe_j .

The Linear Program Theorem 5: There exists an optimal solution to the linear program that corresponds to a fractional multicast flow. Heavily depends on the non-increasing property of the cost function. LP can be used: For any cost sharing mechanism that is cross-monotonic. In case players are not restricted to have a common source. PoA of a minimum potential fractional NE is O(log n).

Integral vs. Fractional Potential Minimization There exists an instance where the gap between the integral and fractional minimum potential solutions is a small constant. Finding an integral Nash equilibrium that minimizes the potential function is NP-hard. Building block: a variation of the Lund-Yannakakis hardness proof of approximating the set cover problem.

The Weighted Multicast Game Each player i has a positive weight wi . The cost share of each player is proportional to its weight. Integral: cost share of player i = ce· (wi / We) (We – weight of players currently using e) Fractional: weighted sharing on each fraction. Theorem: A NE always exists for the weighted fractional model. Note: NE does not necessarily exists for the weighted integral model [Chen-Roughgarden, SPAA 06].

Thank You!