A BGP-Based Mechanism for Lowest-Cost Routing

Similar documents
A BGP-based mechanism for lowest-cost routing

Distributed Algorithmic Mechanism Design for Network Problems

Distributed Mechanism Design and Computer Security

Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks

Understanding the Internet Graph. Christos H. Papadimitriou

Yale University Department of Computer Science

Project: A survey and Critique on Algorithmic Mechanism Design

Introduction to algorithmic mechanism design

Approximation Techniques for Utilitarian Mechanism Design

Cross-Monotonic Multicast

The Index Coding Problem: A Game-Theoretical Perspective

Vertical Handover Decision Strategies A double-sided auction approach

The Strategic Justification for BGP

The Strategic Justification for BGP

Combinatorial Auctions: A Survey by de Vries and Vohra

Autonomous Nodes and Distributed Mechanisms

Incentives for Honest Path Announcement in BGP

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions

Strategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks

Distributed Algorithmic Mechanism Design

Fast Convergence of Regularized Learning in Games

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010

U N I V E R S III I D A D I D C A R L O S I UNIVERSITY CARLOS III OF MADRID. Department of Telematics Engineering. Master of Science Thesis

VCG Overpayment in Random Graphs

Strategic Network Formation

Impersonation-Based Mechanisms

Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach

CSR: Constrained Selfish Routing in Ad-hoc Networks

End-to-end QoS negotiation in network federations

Introduction to Game Theory

Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks

CSR: Constrained Selfish Routing in Ad-hoc Networks

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling

Mechanism Design in Large Congestion Games

Over-contribution in discretionary databases

Mechanism Design for Multicast Cost Sharing in Wireless Networks

Prices and Auctions in Markets with Complex Constraints

Pricing and Forwarding Games for Inter-domain Routing

IN CURRENT distributed systems such as computational

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277)

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

Homework 2: Multi-unit combinatorial auctions (due Nov. 7 before class)

Group Strategyproof Mechanisms via Primal-Dual Algorithms. Key Points to Discuss

Parallel Computation: Many computations at once, we measure parallel time and amount of hardware. (time measure, hardware measure)

DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007

Internet Routing Games

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

Distributed Computing Building Blocks for Rational Agents

The Simplex Algorithm for LP, and an Open Problem

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis

Algorithms, Games, and Networks February 21, Lecture 12

Optimization I : Brute force and Greedy strategy

Introduction to Cryptoeconomics

Assessing the assumptions underlying mechanism design for the Internet

How Bad is Selfish Routing?

An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

A WEB BASED OFFICE MARKET. CS 297 Project Report Presented to Dr. Christopher Pollett San José State University

COOPERATION-AWARE TOPOLOGY CONTROL

Congestion Control in the Network

THe recent popularization of cellular networks (e.g.,

Interdomain Routing and Games

Homework 2: IP Due: 11:59 PM, Oct 19, 2017

Some Tractable Combinatorial Auctions

Mechanisms for Internet Routing: A Study 1

Distance Vector Routing

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout

SIGNIFICANT contributions have been recently made to enhance

Network Formation and Routing by Strategic Agents using Local Contracts

The changing face of web search. Prabhakar Raghavan Yahoo! Research

Hidden Information and Actions in Multi-Hop Wireless Ad Hoc Networks

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

approach is to rely on individuals in a system to select tasks themselves. Both approaches

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

Internet Measurements. Motivation

IN RECENT years, mobile ad hoc networks (MANET) have

Performance Evaluation of Multicast Cost Sharing Mechanisms

Task Routing for Prediction Tasks

A Survey of Recent Results on Real-Time Wireless Networking

An Agent-based Model for the Evolution of the Internet Ecosystem

Sequential Two-Prize Contests

(67686) Mathematical Foundations of AI July 30, Lecture 11

Interdomain Routing. EE122 Fall 2011 Scott Shenker

A Framework for Incentive Compatible Topology Control in Non-Cooperative Wireless Multi-Hop Networks

The Price of Selfishness in Network Coding

Lecture 17: Router Design

1.1 What is Microeconomics?

arxiv: v1 [cs.ma] 8 May 2018

Preliminary results from an agent-based adaptation of friendship games

Hidden-Action in Multi-Hop Routing

Missing Pieces of the Puzzle

A Network Coloring Game

BCN Decision and Risk Analysis. Syed M. Ahmed, Ph.D.

Truthful Approximation Mechanisms for Restricted Combinatorial Auctions

Internet Economics. Networked Life NETS 112 Fall 2013 Prof. Michael Kearns

Transcription:

A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang

Theoretical Motivation Internet is comprised of separate administrative domains known as AS. Interdomain Routing occurs among different ASes. Each AS has its own economic incentive for routing behaviors. ASes do not behave simply as compliant or Byzantine Adversaries, they behave strategically to maximizes their returns and minimizes their costs. - They can do so by lying about the actual information they hold. Using game theory to design a mechanism that ensures every router behaves in certain way that optimizes overall network performance.

Mechanism Design n agents, i {1,... n}; Each agent has some private information, t i, called type. Output specification: mapping each type vector t = (t 1,... t n ), to a set of allowed outputs. intuitively, output specification tells what a good planner would do if it has access to all private informations. Valuation Function: assigning, for a single agent i, a score for an output given the agent s private information, i.e, v i (t i, o). Mechanism: Define, 1) for each agent, a set of strategies A i ; 2) each agent plays a strategy a i A i ; 3) for an input vector: (a 1,..., a n ), the mechanism outputs two things 1. a single output, o = o(a 1,... a n ) 2. payment vector, p = (p 1,... p n ), where p i is a payment function = p i (a 1,... a n );

$100 Mechanism Design (Continues) $10 A Payment:p a $80 $10 B C $8 Payment:p b $1 Payment:p b Result Output Specification: [100,80,10] --> [8,10]

Mechanism Design (Continues) Agent s Utility: τ k = vi(ti, o) + pi; - Represents the overall rewards to the agent. - Agent K s only goal is to maximize this utility. Strategyproof Mechanism: Mechanism where types are part of the strategy space Ai, each agent maximizes his utility by giving his type ti as input. v i (t i, o(a i, t i )) + p i (a i, t i ) v i (t i, o(a i, a i )) + p i (a i, a i )) where, a -i means (a 1,... a i-1, a i+1,... a n ) The mechanism wants each agent to report his private type truthfully, and pay agents in order to provide incentives for them to do so.

VCG Family Mechanism Consider an example: Vickrey s Second Price Auction Single Item is for sale on ebay among n buyers, with each buyer having a scalar value w i that he is willing to pay (i.e, it s private information). Each people is bidding independently. Assume the price of final sale to be p. Utility in this case is τ i = w i - p (if i wins the item) = 0 (someone else wins) A natural social choice is to give the item to the player who values it the most. Second Price Auction: Player with highest prices wins, but pays 2nd-highest price.

VCG Family Mechanism (continues) Example: Player A bids $10; (cost of -10) Player B bids $8; (cost of -8) Player C bids $6; (cost of -6) Under VCG: Highest wins, pays second highest: $8; Under non-vcg: (Pay your bid), A bids $10, pays $10; (No payment), A bids $10, pays none; Under non-vcg, agents have incentive to lie about their bids in order to gain more utility. For example, A would be better of stating its bid as $9 for Pay your bid, or under no payment. Under VCG, A can never be better off if it lies about its bids. The actual payment would be: payment = [declare cost (u k )] + [cost without A (h k )] - [cost with A (V)] = -10 + -8 - (-10) = -8. A pays -8, with utility of (10-8) = 2.

Problem Formulation The nodes are the strategic agents; Each As incurs a per-packet cost for carrying traffic which is the private information for each agent. The network is Biconnected, so there is no monopoly. Goal is to maximize the network efficiency by routing packet alongs the LCP. Takes in n AS numbers and constructs LCPs for all source-destination pairs. Compute the routes and payments with a distributed protocol based on BGP. Admitted Disadvantages: Per-packet costs are not the best model. LCP routing is not necessary the preferable routing policy.

Problem Formulation (continues) A network has a set of nodes N, n = N. A set L of bidirectional links between nodes in N. The network, called AS Graph, is biconnected, i.e, it s connected and nonseparable. Failure of a link would not separates the network. For any two nodes i,k N, T ij is the traffic intensity (i.e, # of packets) being send from i to j. Node k incurs a transit costs c k for each transit packet it carries, which is also the private information for this node. C k assumes to be independent of which neighbor k received the packet from and which neighbor the packet is send to. Each node k is given a payment p k to compensate it for carrying transit traffic. Payment can depends on the traffic and network topology, but the only assumption is that nodes receive no payment if carrying no traffic.

Problem Formulation (continues) Let I k (c;i,j) be the indication function for LCP from i to j; i.e I k (c;i,j) = 1 (k is a node on LCP from i to j) 0 (otherwise) Note: I i (c;i,j) = I j (c;i,j) = 0. Total cost uk incurred by transit node k: u k (c) = c k i,j N T ij I k (c;i,j) Total Cost to the society: V(c) = k u k (c). We want to minimize the total cost to the society, and it s equivalent to minimizing, for every i,j N, the cost of the path between i and j.

Problem Formulation (continues) The only way we can assured of minimizing V( ) is for agents to inputs their true costs. And we must rely on pricing scheme to incentivize agents to do so. The mechanism must be strategyproof, i.e for all x τ k (c) > τ k (c k x), where c k x = c i ( i k) x ( i = k)

Pricing Mechanism Theorem 1 When routing picks lowest-cost paths, and the network is biconnected, there is a unique strategyproof pricing mechanism that gives no payment to nodes that carry no transit traffic. The payments to transit nodes are of the form p k = i,j N T ijp k ij, where p k ij = c ki k (c; i, j)+ [ I r (c k ; i, j)c r r N r N I r (c; i, j)c r ] Proof. Consider a vector of costs c. Recall that our objective.

What pricing Scheme Really says... Payment to agent k for carrying traffic from i to j = (1) 0 if k does not carry any traffic, otherwise (2) payment = k s declared cost + k s helpfulness = k s declared cost + (cost to the network without k) - (cost to the network with k) This is provably the only payment scheme that guarantees: (1) optimal social welfare. (2) truthful report of private information from agents.

Implementation By using the current BGP protocol to distribute information about the cost function in the network. To know the payment, we need to know the (1) private information; (2) cost to the network when routing through me; (3) cost to the network when routing through an alternative paths; (1) is obvious. (2) is computed by summing the information carried in the BGP header along its AS-path, and is stored in the BGP routing table. (3) can not be calculated immediately, but it can be estimated by keeping a upper bound and update this upper bound by the information carried in BGP headers, and have it converges to a stable correct value. - Big Assumption for this result: the network topology is static.

Implementation (continues) Details of how this algorithm is derived is omitted here The key result is that the estimation is tight, and it converges to the correct LCP and prices after a certain number of rounds. If a is i s parent in T (j), then i scans the incoming array and updates its own values if necessary: p v r ij =min(pv r ij,pv r aj ) r s 1 If a is a child of i in T (j), i updates its payment values using p v r ij =min(pv r ij,pv r aj + c i + c a ) r s If a is neither a parent nor a child, i first scans a s updated path to find the nearest common ancestor v t. Then i performs the following updates: r t p v r ij =min(pv r ij,pv r aj + c a + c(a, j) c(i, j)) r >t p v r ij =min(pv r ij,c k + c a + c(a, j) c(i, j)) The algorithm is summarized in Figure 3.

Discussion? Known issues to VCG mechanism. Over payment? Unrealistic assumptions made by author about the network. Does re-feedback fall into this theoretical category?