Sharing Costs for Better Selfish Network Design

نویسندگان

  • Ho-Lin Chen
  • Tim Roughgarden
  • Gregory Valiant
چکیده

We consider how to design network cost-sharing protocols to induce benign selfish behavior in large networks. We study this issue in network cost-sharing games, where the set of Nash equilibria depends fundamentally on the choice of the underlying edge cost-sharing protocols. We seek cost-sharing protocols that minimize the inefficiency of equilibria in the resulting network design game, as measured by the price of anarchy or the price of stability. We delineate between oblivious cost-sharing protocols, where each edge computes cost shares using only “local” information, and the more powerful but less practical class of non-oblivious protocols, where the cost-sharing method of an edge can be informed by the global structure of the network. In undirected networks, even oblivious cost-sharing schemes can dramatically improve the worstcase price of anarchy over that incurred by previously considered schemes. We give nearly matching upper and lower bounds on the worst-case price of anarchy achievable by both oblivious and non-oblivious cost-sharing, in both single-sink and multicommodity networks. In directed networks, simple examples show that non-trivial positive results are possible only for the price of stability. We show that among oblivious cost-sharing protocols, the Shapley cost-sharing scheme minimizes the worst-case price of stability. Conceptually, this result implies that giving edges the ability to identify the identities of its users—as opposed to just the number of users—has no impact on the price of stability, provided only local information is available. We also give results for the price of stability under non-oblivious cost-sharing schemes. Department of Computer Science, Stanford University, 393 Terman Engineering Building, Stanford, CA 94305. Research supported in part by NSF Award 0323766. Email: [email protected]. Department of Computer Science, Stanford University, 462 Gates Building, 353 Serra Mall, Stanford, CA 94305. Supported in part by ONR grant N00014-04-1-0725, DARPA grant W911NF-05-1-0224, and an NSF CAREER Award. Email: [email protected]. Harvard University. Part of this work done while visiting Stanford University and supported in part by DARPA grant W911NF05-1-0224. Email: [email protected].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

VII . Implementation of peer and client Start RMI registry Peer - 1

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions. A typical overlay network for routing or content sharing, each node must select a fixed number of immediate overlay neighbors for routing t...

متن کامل

BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation OVERLAY NETWORK CREATION AND MAINTENANCE WITH SELFISH USERS

Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumpti...

متن کامل

Policy Model for Sharing Network Slices in 5G Core Network

As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...

متن کامل

Selfish Overlay Network Creation and Maintenance

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for the case of cooperative peers and perform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006