Close
About
FAQ
Home
Collections
Login
USC Login
Register
0
Selected
Invert selection
Deselect all
Deselect all
Click here to refresh results
Click here to refresh results
USC
/
Digital Library
/
Computer Science Technical Report Archive
/
USC Computer Science Technical Reports, no. 764 (2002)
(USC DC Other)
USC Computer Science Technical Reports, no. 764 (2002)
PDF
Download
Share
Open document
Flip pages
Contact Us
Contact Us
Copy asset link
Request this asset
Transcript (if available)
Content
1 Oblivious AQM and Nash Equilibria Debojyoti Dutta, Ashish Goel, John Heidemann USC/ISI (ddutta@isi.edu, agoel@usc.edu, johnh@isi.edu) Abstract— An oblivious Active Queue Management scheme is one which does not differentiate between pack- ets belonging to different flows. In this paper, we study the existence and the quality of Nash equilibria imposed by oblivious AQM schemes on selfish agents. Oblivious AQM schemes are of obvious importance because of the ease of implementation and deployment, and Nash equilibrium of- fers valuable clues into network performance under non- cooperative user behavior. Specifically, we ask the following three questions: 1) Do there exist oblivious AQM schemes that impose Nash equilibria on selfish agents? 2) Are the imposed equilibria, if they exist, efficient in terms of the goodput obtained and the drop probabil- ity experienced at the equilibrium? 3) How easy is it for selfish users to reach the Nash equi- librium state? We assume that the traffic sources are Poisson but the users can control the average rate. We show that drop- tail and RED do not impose Nash equilibria. We modify RED slightly to obtain an oblivious scheme, VLRED, that imposes a Nash equilibrium, but is not efficient. We then present another AQM policy, EN-AQM, that can impose an efficient Nash equilibrium. Finally, we show that for any oblivious AQM, the Nash equilibrium imposed on selfish agents is highly sensitive as the number of agents increases, thus making it hard for the users to converge to the Nash equilibrium, and motivating the need for equilibria-aware protocols. I. INTRODUCTION Several transport layer congestion control algo- rithms and router strategies (Active Queue Management schemes) have evolved over the last fifteen years. Con- gestion reactive protocols such as TCP [1], [2] and AQM strategies such as RED [3] have catalyzed a lot of inter- esting research for the last decade. For our purposes, The authors are at at the Computer Science Department and the In- formation Sciences Institute at the University of Southern California. This work is supported, in part, by DARPA and the Space and Naval Warfare Systems Center San Diego (SPAWAR) under Contract No. N66001-00-C-8066. Ashish Goel’s research was also supported, in part, by NSF CAREER Award no. 0133968. AQM strategies can be classified into two types: oblivi- ous (stateless) and stateful. An oblivious AQM scheme does not inspect packets to determine which flow they be- long to. Hence it cannot perform differential marking or scheduling for different flows. Stateful schemes such as fair queueing [4] offer good performance on a variety of metrics. On the other hand, oblivious schemes such as drop-tail and RED are easier to implement and have en- joyed wider deployment. The current Internet is dominated by TCP traffic [5]. The TCP protocol is well defined, robust, and congestion- reactive [6]. However, there are indications that the amount of non-congestion-reactive traffic is on the rise [7]. Most of this misbehaving traffic does not use TCP. Thus, it seems important to study scenarios where end-points are greedy and selfish, and do not follow so- cially accepted congestion control mechanisms. TCP (and in fact, any transport protocol that we are aware of) does not guarantee good performance in the face of aggres- sive, greedy users who are willing to violate the protocol to obtain better performance. It would be quite useful to have protocols which lead to an efficient utilization and a somewhat fair distribution of network resources (like TCP does), and also ensure that no user can obtain better per- formance by deviating from the protocol. We use the term protocol equilibrium to describe this phenomenon. If pro- tocol equilibrium is achievable, then it would be a useful tool in designing robust networks. Of course, one could use stateful schemes such as fair queueing to guard against selfish users. However, in this paper, we would like to explore the limits of what can be achieved using oblivious AQM schemes that are oblivious and easily deployable. The existence and practicality of protocol equilibrium (even assuming that the routers adopt oblivious AQM schemes) appear to be very hard questions to answer, and an incremental approach for tackling this problem seems appropriate. Selfish users can be modeled using tools from game theory [8]. In a game there are rules and players. In the Internet game, the rules are set by the AQM policies and the players are the end-point selfish traffic agents. A fundamental solution concept in game theory is the Nash 2 equilibrium [8]. In the context of our problem, a Nash equilibrium is a scenario where no selfish agent has any incentive to deviate from its current state. Thus the exis- tence of a Nash equilibrium implies a stable state of the network in the presence of selfish users, but does not pro- vide any clues as to how this state should be achieved. It is easy to see that an oblivious AQM strategy can- not lead to a protocol equilibrium unless it also imposes a Nash equilibrium on selfish users. As a first step, in this paper, we explore the existence and the quality of the Nash equilibria that can be imposed on selfish users by oblivious AQM strategies. We will assume that goodput is the performance metric of interest to the selfish users and each user controls its own offered load. Although our work was motivated by the broader question of protocol equilibria, we believe that our results are interesting in their own right. Oblivious AQM schemes are of obvious importance because of the ease of implementation and de- ployment, and Nash equilibrium offers valuable clues into network performance under non-cooperative user behav- ior. A. Our Contribution In this paper, we study the Nash equilibria imposed by oblivious AQM schemes on selfish agents which gener- ate Poisson traffic but can control the average rate. We will restrict ourselves to AQM strategies that guarantee bounded average buffer occupancy, regardless of the total arrival rate. Specifically, we address the following ques- tions: 1) Existence: Are there oblivious AQM schemes that impose Nash equilibria on selfish users? 2) Efficiency: If an oblivious AQM scheme can im- pose a Nash equilibrium, is that equilibrium good or efficient, in terms of achieving high goodput and low drop probability? 3) Reachability/Achievability: How easy is it for the users / players to reach the equilibrium point? We first derive a necessary and sufficient condition, that we call the Nash condition, for oblivious AQM schemes to impose Nash equilibria on selfish users. We show that the popular oblivious AQM strategies, drop-tail and RED, do not impose Nash equilibria on selfish users. Then we propose a variation of RED, VLRED, that can impose a Nash equilibrium. But we note that the utilization at the equilibrium point drops to asymptotically as the number of users increases. This motivates us to develop another AQM scheme (EN-AQM) which can impose a Nash equi- librium and guarantee strict bounds on equilibrium perfor- mance, that is, provide lower bounds on goodput, bounded average delays, and upper bounds on drop probability at equilibrium. It is surprising that oblivious schemes can have such strong properties. We also observe that for any oblivious AQM scheme, the Nash equilibrium imposed on selfish agents is highly sensitive to the increase in the number of users, making it hard to deploy and difficult for users to converge to. This further motivates the need for equilibrium aware proto- cols. B. Related Work Game theory [8] is a very mature topic. The current challenges of game theory applied to computer networks are summarized by Papadimitrou [9]. Several papers (for example [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [19]) have looked at applying tools from microeconomic theory and game theory to computer net- works over the last fifteen years. A thorough literature survey is beyond the scope of the paper. We now con- sider some of the most directly relevant related work and compare them with our approach. In [14], Douligeris et. al. determine conditions for Nash and Stackelberg equilibrium for a M/M/1 system when the utility function is a composite function of the throughput and the delay. Our work models routers using more realistic models. For example, we use the M/M/1/K queue [22] to model drop-tail routers. Thus our game is quite different from theirs. Also, they do not model drop- tail and RED while we do. Besides, we present AQM schemes that impose Nash equilibria on selfish users with bounded average buffer occupancies. Korilis et. al. [13] model the problem of decentralized control as a constrained game in which the strategy of any player is dependent on other players. The model includes a primitive acknowledgment based Markovian traffic ar- rival with an upper bound on the arrival rate and service time. They show that Nash equilibria can exist in a general product-form network under the condition guaranteeing that no one user can be forced out of the system by other users. Unfortunately, that assumption may not be valid at all times in the Internet. This is true especially with routers having limited buffers. We, on the other hand, look at equilibria imposed by AQM schemes at routers using realistic models with bounded average buffer occu- pancies. Besides, we look at oblivious AQM schemes. Shenker [15] takes another approach and views the In- ternet game from a switch scheduling perspective. The authors prove that with Markovian arrival rates, the fair share allocation scheme is the only scheme within a class of buffer allocation functions (called MAC) that can guar- antee a Nash equilibrium (on selfish agents), and, is also Pareto efficient. The authors use a simple M/M/1 model 3 for their switch service discipline and they study equi- libria imposed by the buffer allocation algorithm. We show, in the appendix, that oblivious AQM schemes with bounded average buffer occupancy cannot be in MAC. Hence, the MAC framework is not applicable to our prob- lem. Also, they do not consider existence of Nash equi- libria for newer schemes like RED as we do. On the other hand, we do not investigate Pareto optimality of AQM strategies. In a way, this is an extension of the above pa- per. Several other papers have investigated related prob- lems. For example, Park et. al. [11] study Nash equi- librium properties of the QoS game. However their utility functions are much different from ours due to their multi- level service model and threshold based step functions for modeling utility. They claim that for a single service level, their model boils down to that in [15]. Gibbens et. al [23] have studied the effect of selfish users in the context of the user optimization problem defined in [24]. Their model assumes that the selfishness arises due to the user’s disre- gard for the effect of its own action on prices. They model the Internet game differently using a AIMD like protocol with the congestion marks from the routers. Thus, our as- sumptions and our problem is different from theirs. Note that we have not looked at feedback signals from the net- work and pricing issues. In a recent paper Akkela et. al. [16] model greedy users with a TCP like algorithm where selfish users can control the traffic by varying the parameters of the AIMD congestion control algorithm. They show that RED does not have a Nash equilibria using empirical models and through simulation. Also they have a re- stricted notion of selfish traffic. They also propose a variation of CHOKe [25] and show, by simulation, that a good Nash equilibrium is reached by TCP like greedy flows. Unlike their work, this paper makes formal argu- ments to prove results for a more general class of self- ish users. Also, unlike them, we consider oblivious AQM techniques. We are not aware of any other work that for- mally analyzes the Nash equilibrium imposed on selfish users by oblivious AQM strategies. The format of this paper is as follows. Section II defines the Internet game. In Section III, we show that the current mechanisms present in the Internet, drop-tail and RED, cannot impose Nash equilibria on selfish agents. Then, we propose a new variant of RED that achieves Nash equilib- rium in Section III-C. We note that this proposed scheme is not efficient. In Section IV, we present a simple router mechanism that imposes a Nash equilibrium and, at the same time, bounds the network performance at equilib- rium. Then we discuss the sensitivity of the Nash equilib- rium imposed by oblivious AQM schemes in Section VI and argue that selfish users would find it hard to reach the equilibrium state. Finally we discuss our future directions and conclude in Section VI. II. THE MARKOVIAN INTERNET GAME: PRELIMINARIES The Markovian Internet game can be defined as fol- lows. The players are end-point traffic agents. These agents are selfish, that is, they are only concerned about their own good. Each player has a strategy which is to control the average rate of traffic that the player tries to push through the network. We model the players’ traffic arrival rate by a Poisson process with an average rate of . Each player has a simple utility function equal to its goodput . The rules of the game are determined by the AQM schemes in routers. In this work, we only con- sider oblivious AQM schemes. An oblivious router has a drop probability due to an average aggregate load of and an average service time of unity. Now, oblivious routers may or may not impose symmetric Nash equilib- ria on selfish agents. A symmetric Nash equilibrium en- sures every agent has same goodput at equilibrium. We only consider symmetric Nash equilibrium in this paper and we drop the symmetric adjective throughout the pa- per. Also, unless mentioned otherwise, quantities such as the rates, goodput and throughput are averages as we as- sume Poisson traffic sources. For Nash equilibrium to hold, we have the following conditions: No agent can increase their goodput, at Nash equi- librium, by either increasing or decreasing their throughput. This can be written down as (1) Since , . for all . At Nash equilibrium, all flows have the same utility or goodput. That is, "!$# %’& and ( &*) . For oblivious AQM strategies and functions of router states like drop probability and queue length, (+ , ,- . The above conditions can be used to derive an interest- ing condition that must be true at Nash equilibrium. The utility function for each agent can be written down as . ( 0/+123 4 Taking partial derivatives we get ( /+1 21 Since we consider only oblivious AQM schemes, we have ( , ,- . Since we consider symmetric Nash equilibrium, we must also have. Thus, we have the following Nash condition which must be satisfied at Nash equilibrium: , / 1 , (2) To evaluate whether the Nash equilibrium imposed by an AQM scheme is good, let us define a term, efficiency. Let the the aggregate throughput, goodput, drop probability be denoted by , and respectively. The Nash equilibria imposed by an AQM is efficient, if the goodput of any selfish agent is bounded below when the throughput (offered load) of that same agent is bounded above. The conditions for efficiency are: 1) 0/ 1 2) where , are some constants. Thus is easy to see that even the equilibrium drop probability is also bounded. TCP Traffic and Equilibria Before we delve into the technical details, it is interest- ing to see how TCP traffic fits into the picture. TCP traf- fic is the dominant traffic in the Internet. However, TCP does not exhibit selfish behavior unless one changes the underlying protocol. It is known ( [26]) that there exists a unique equilibrium point in a network with long lived TCP flows resulting in a steady state. Akkela et.al [16] model selfish traffic that behaves like TCP on loss indi- cations, uses an AIMD protocol, and allows the level of selfishness to be controlled by the two AIMD parameters [16]. We believe that their model covers only a subset of selfish users. In our work, we do not make any assumption of the nature of the selfish protocol. In the following subsections, we will consider the interaction of routers and greedy Poisson traffic with variable rates. III. EXISTENCE In this section, we answer the existence question as out- lined in Section I-A, that is, whether there exist oblivi- ous router strategies that impose Nash equilibria on self- ish agents. First, we consider the existence of equilibria of popular AQM schemes like drop-tail and RED. Then, we propose a simple scheme of our own. We shall use sim- ple router models with the help of queueing theory [22]. Recall that, for the sake of simplicity, we assume that the average service time of our queueing systems is unity. A. Drop-tail Queueing In this section, we consider drop-tail routers prevalent in the Internet and we model them with a M/M/1/K queue. From queueing theory, we know that the drop probability of a drop-tail router with a buffer size B and offered load is given by 0/+1 / 1 Then we have the following theorem, the proof of which is simple and intuitive, and, is presented here for complete- ness: Theorem 1: For selfish agents and routers implement- ing drop-tail queuing, there is no Nash equilibrium. Proof: Consider a single link with a maximum buffer size of and several selfish flows traversing this link. Let ’ , be the throughput, goodput of each flow respectively. Assume to be the drop probability of the router. Then, is given by 0/+1 0/+1 Applying the condition for Nash equilibrium, and noting that drop-tail is oblivious, we have ( 0/+1 3 ( ( , ,- The first term in the above equation is positive as ( 1 ( The proof of the second term being positive is shown in Section B of the appendix. Thus, is positive and there can be no Nash equilibrium. 5 0 10 20 30 40 50 Average buffer occupancy 0 0.2 0.4 0.6 0.8 1 1.2 Drop Probability 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 3 Normalized offered load 0 0.1 0.2 0.3 0.4 0.5 0.6 Drop Probability 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 3 Normalized offered load 0 5 10 15 20 Average buffer occupancy Standard RED transfer function Transfer function from our model Buffer occupancy from our model Fig. 1. The different models of RED. In this example, the maximum buffer size = 50, = 10, = 20 and = 0.3 B. RED RED [3] (Random Early Detection) is an AQM scheme that prevents global synchronization and achieves lower average buffer occupancies. To analyze whether this scheme can impose a Nash equilibrium using our ap- proach, we need an analytical model of RED that yields the drop probability as a function of the offered load. Thus, we borrow an approximate steady state model of RED from [27] for our analysis. The standard RED trans- fer function and that along with our transformation is shown in Figure 1. Let the average queue length at the router be and the drop probability at the router be . The RED characteris- tics can be expressed by if ! !"$#&%(’ ) +* !"$#&%(’-,/. 0214325 16375 %(’98 1;:=< %>’ if !"=#?%>’A@ @BC%>’ D otherwise. (3) As long as the queue length is below EGFIHKJL , the drop probability is zero. If queue length is between EGFIHMJL and EONQP6JL , drop probability increases linearly between 0 and 6RBSUT . After this limit is crossed, drop probability becomes unity. Lemma 1: The steady state average value of the queue- length with utilization V and drop probability is given by XW VZYC[]\^‘_ []\XVZYC[]\^a_Qb (4) Lemma 2: In the steady state, the average queue length of a RED router is never larger than EONQPaJL The proofs of the above two lemmas are simple and have been omitted. The basic intuition behind Lemma 1 is that the RED buffer sees a thinned arrival process with an aver- age rate of VZYC[c\da_ . Also, if the average drop probability seen at this router is and the steady state queue length is between the interval EGFIHKJL and EONeP6JL , the drop prob- ability at this router is given by W YgfihkjlQm9n jl4fhkjlQm9n \oEGFIHaJLe_Bpq4RBSrT EONQP6JLs\oEGFIHaJL b With the above model, the following theorem is easy to prove: Theorem 2: RED does not impose a Nash equilibrium on uncontrolled selfish agents. Proof: From Equation 4, we solve for [\^ and get [\^ W Y [ctX _&Y [ V _ b Now the goodput, u‘v , in terms of the offered load V4v as uav W VwvUYC[]\^‘_ W Y Vwv V _&Y [ctx _ b Now taking partial derivatives, we have y u v y Vwv W Y z [ctX _ y y Vwv Y V v V _atY V v V _ y y Vwv Y k [ctX _ b Now, { { f " Y f " f _d|~} . Since RED is oblivious, the second term in the above equation is Y f " f _ j hzj2!rnk! f . It is easy to prove that f }e_ . The proof is very simple, and has been omitted. Thus {- " { f " |} . The intuition behind the above proof is as follows. RED punishes all flows with the same drop probability. The nature of the drop function is considerably gentle. Thus, misbehaving flows can push more traffic and get less hurt (marginally). Hence there is no incentive for any source to stop pushing packets. This implies the non-existence of an equilibrium. C. Virtual Load RED (VLRED) In the previous sub-sections, we saw that drop-tail and RED do not impose Nash equilibria on selfish users. In 6 this section, we answer the question of the existence of Nash equilibria as defined in Section I-A. We show that Nash equilibrium can be imposed by changing the RED transfer function. In this section, we present a new AQM technique, Virtual Load RED (VLRED), where the transfer function for the drop probability can be written down as ! "#%$’& / otherwise (5) Here # . Note that ( is the length of the infinite buffer M/M/1 queue when faced with the same load. In- stead of using the measured queue length, as in RED, we have used virtual queue lengths, hence the name VLRED. Now, we ask whether this AQM strategy has a Nash equi- librium. Theorem 3: VLRED imposes a Nash equilibrium on selfish agents if ) +* / %$,& 1 / . Proof: Suppose there are flows with each source offering a load of . Let us assume that the drop proba- bility can be written down as a continuous function for all %$,& given by 1 %$’& 1 Then we have , ,- / %$’& 1 /+1 / 1 Now using the Nash condition in Equation 2, we have - . /10323465879/ ;: 45=< -?> . 7 >A@CB > . 7 >ED6F <HG : . 7 I JLK I 79/ : 45 /10M2345879/ : 465 ON G=P > . 7 > @CB > . 7 > D6F G : - B /Q0323457R/ : 465 D 7 B > . 7 > 7R/ : 465 D < Substituting S and simplifying, we have S / TS 1 U%$’& (6) The positive root of the the above equation is S WV / YX U%$,& Z 1 / Z For this solution to be valid, S [ . It is easy to show that this is true if [ * / %$,& L\ 1 / . The proof is very simple and has been omitted. Thus, the existence of the solution under the given condition proves that the Nash equilibrium exists. Note that we can get the throughput at the Nash equilibrium by ] / . A surprising feature of our solution is that the root, when valid, is independent of ) . D. Discussion We now illustrate the properties of this Nash equilib- rium with an example. We take [ %$,& ^ / ^ and solve Equation 6. As increases, the goodput of the system starts to decrease due to increas- ing drop probability due to the average buffer occupancy approaching %$’& and the # rising very steeply. This effect is shown in Figure 2 where the y-axis plots both the throughput and the goodput as we increase the number of flows, shown in the x-axis. Also, we can formally prove the following: Theorem 4: VLRED is not efficient. Proof: Assuming a unit service rate at a router, the drop probability can be written in terms of the total ar- rival rate as /+1 where and are some constants. Differentiating the above equation we have , , 0/ 1 Now rearranging the terms after using Equation 2 and equating with the above equation, we have /+1 0/ 1 3 Now, _ a‘ b and 0/ 1 3 is the total goodput . Assume that VLRED is efficient. Then, by the definition of efficiency, the goodput is bounded above and below by constants, and, hence, c’ b . Now, in VLRED, is bounded by ! ! . Thus, is bounded by a con- stant. Hence, the goodput falls to asymptotically. Thus, even though VLRED has a Nash equilibrium, it is clear that the equilibrium points do not have very high uti- lization. Hence, there is a need to design oblivious AQM strategies that result in efficient equilibria. IV. EFFICIENCY In the previous section, we have seen that even though VLRED can impose a Nash equilibria on selfish users, it is not efficient. In this section, we ask whether there is a router strategy that can impose an efficient Nash equilib- rium. This is the second question as defined in Section I- A. We present an oblivious AQM strategy, namely Effi- cient Nash AQM (EN-AQM), which ensures the existence of an efficient Nash equilibrium. 7 0 10 20 30 40 50 Number of flows 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Normalized goodput/offered load Total Offered Load Goodput Fig. 2. The throughput and the goodput at a VLRED router as the number of flows changes Consider a single bottleneck link. From the previous sections, we have seen that in order for a router queue management technique to enforce a Nash equilibrium Equation 2 must be satisfied. Now, assume that the to- tal desirable offered load at Nash equilibrium is related to the number of greedy agents in the following way ] / 1 / X (7) The intuition behind this relation is presented in Sec- tion V. Using the above equation, and the Nash condition, after allowing to be continuous for the time being, we can write down , /+1 ,- Z * /+1 Now, substituting /+1 , we have 1 , / 1 / Z , / 1 1 , / 1 Integrating the above equation, we have / 1 / /+1 where is an arbitrary constant to be determined. The solution can be written down as / 1 / /+1 To choose k, we assume that when there is one user, we would like to ensure that the drop probability is zero as long as his offered load is less than unity. This gives . Thus the transfer function of EN-AQM is given by / 1 / * / * /+1 / 1 * /+1 (8) 0 10 20 30 40 50 Number of flows 0 0.2 0.4 0.6 0.8 1 Normalized offered load/drop prob./goodput offered load drop probability goodput Fig. 3. The offered load (throughput), drop probability and the good- put at the Nash equilibrium imposed by EN-AQM as the number of flows passing through our router mechanism changes By our assumption, is bounded. It is simple, albeit tedious, to prove that is also bounded. We omit the proof, and, instead, use Figure 3 to illustrate the efficiency of EN-AQM. To see how EN-AQM works, let us look at Figure 3. We see that as even though the number of flows through the router increases, the drop probability and the good- put at the Nash equilibrium are bounded. This illustrates that EN-AQM can ensure an efficient Nash equilibrium. Hence, with very minimal information, we can ensure that our oblivious router mechanism achieves the objec- tive of ensuring a Nash equilibrium that yields good per- formance under selfish behavior. The constants which the drop probability and the throughput convey can be fine tuned by modifying the constant and the constant X in Equation 7. V. ACHIEVABILITY In the previous section, we have seen that EN-AQM can impose an efficient Nash equilibrium on selfish agents with bounds on performance and drop probability. Now we move on to the answer the third question in Section I- A: How can we ensure that agents actually reach the Nash equilibrium state. In this section, we show that the equi- librium imposed by any oblivious router strategy is very sensitive to the number of agents, thus making it imprac- tical to deploy in the Internet. Let us define to be the offered load at equilibrium when the number of agents is . We can now rewrite the drop probability as a function of the aggregate offered load as . Let us also assume that is non- decreasing and convex. From Equation 2 and the fact that 8 an efficient AQM will bound the drop probability, we get ( where are some constants. Let us also define a sen- sitivity coefficient , when the number of agents in the system is , such that 1 Now, the following must be true due to the convexity of ( By efficiency, we get the following equation where is a constant Consider . Then, using the above equation, we have Now the left hand side is bounded iff / 1/ , or 1 Z . This gives us _ ‘ . Hence, we can see that as increases, the sensitivity coefficient becomes smaller and smaller, that is, it falls faster than an inverse quadratic. Thus, it is hard for agents to reach the equilibrium point without any help from the router. Note that the above analysis points out the relation be- tween the number of users and the total offered load in Equation 2. We see that relation must have a term in . @ . Choosing / , and setting some realistic boundary con- ditions, we get the strategy EN-AQM; this is the intuition behind Equation 7 in Section IV. VI. DISCUSSIONS, CONCLUSION AND FUTURE WORK In this paper, we have investigated the following three questions pertaining to Nash equilibria imposed by obliv- ious AQM techniques on selfish users: existence, ef- ficiency and achievability. We have shown that drop- tail and RED, cannot impose a Nash equilibrium. We have also shown there are simple mechanisms, such as VLRED, that do impose Nash equilibria. Then we showed that there are AQM schemes, such as EN-AQM, that can impose efficient Nash equilibria. Finally, we showed that the equilibrium points in oblivious AQM strategies are very sensitive to the change in the number of users. Thus it may be hard to deploy oblivious schemes that do have Nash equilibria without the explicit help of a protocol. Previous work [15] has shown that only the fair share mechanism can have Pareto efficient Nash equilibria. Also, Douligeris et. al [14] show that it is possible to to reach Nash equilibria with the power utility function. They assume a M/M/1 system with infinite buffer capac- ity and they use a very different composite utility func- tion involving the goodput and the delay. In contrast, we have considered more realistic models of router mecha- nisms with bounded buffers for drop-tail queueing and we also analyze RED. We have noticed that the results are significantly different due to our requirement of bounded average buffer occupancies. We need to explore each of the above proposed policies in detail. For VLRED, we need to explore why the Nash equilibrium point does not result in good network utiliza- tion. Our conjecture is that VLRED’s drop function be- comes very harsh as we reach equilibrium. Thus, there is a need to study gentler versions of VLRED and determine whether such medications can still impose Nash equilib- ria. We should note that the it is difficult for users to reach the equilibrium point as the equilibrium point is too sen- sitive. This motivates the question of Protocol Equilib- rium: Can we design protocols which lead to efficient network operation, such that no user has any incentive to unilaterally deviate from the protocol. REFERENCES [1] J. Postel, “Transmission control protocol,” Internet Request for Comments RFC 793, September 1981. [2] V . Jacobson, “Congestion avoidance and control,” ACM Com- puter Communication Review; Proceedings of the Sigcomm ’88 Symposium in Stanford, CA, August, 1988, vol. 18, 4, pp. 314– 329, 1988. [3] S. Floyd and V . Jacobson, “Random early detection gateways for congestion avoidance.,” IEEE/ACM Transactions on Network- ing, V .1 N.4, 1993. [4] A. Demers, S. Keshav, and S.J. Shenker, “Analysis and simula- tion of a fair queueing algorithm,” Sigcomm, 1989. [5] Vern Paxson, “End-to-end Internet packet dynamics,” IEEE/ ACM Transactions on Networking, vol. 7, no. 3, pp. 277–292, 1999. [6] Jitedra Padhye, Victor Firoiu, Don Towsley, and Jim Krusoe, “Modeling TCP throughput: A simple model and its empirical validation,” in ACM SIGCOMM ’98 conference on Applications, technologies, architectures, and protocols for computer commu- nication, Vancouver, CA, 1998, pp. 303–314. [7] Sally Floyd and Kevin Fall, “Promoting the use of end-to-end congestion control in the Internet,” IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 458–472, 1999. [8] Martin J. Osborne and Ariel Rubenstein, A Course in Game The- ory, The MIT Press, Cambridge, Massachusetts, 1994. [9] Christos H. Papadimitrou, “Algorithms, games, and the internet,” in STOC, 2001. 9 [10] D. Ferguson, C. Nikolaou, J. Sairamesh, and Y . Yemini, “Eco- nomic models for allocating resources in computer systems,” In Scott Clearwater, editor, Market-Based Control: A Paradigm for Distributed Resource Allocation, Scott Clearwater. World Scien- tific, Hong Kong, 1996., 1996. [11] K. Park, M. Sitharam, and S. Chen, “Quality of service provision in noncooperative networks: heterogeneous preferences, multi- dimensional qos vectors, and burstiness,” Proc. 1st International Conference on Information and Computation Economies , 1998., 1998. [12] Yannis A. Korilis, Aurel A. Lazar, and Ariel Orda, “Architecting noncooperative networks,” IEEE Journal of Selected Areas in Communications, vol. 13, no. 7, pp. 1241–1251, 1995. [13] Yannis A. Korilis and Aurel A. Lazar, “On the existence of equi- libria in noncooperative optimal flow control,” Journal of the ACM, vol. 42, no. 3, pp. 584–613, 1995. [14] C. Douligeris and R. Mazumdar, “On pareto optimal flow con- trol in an integrated environment,” Proc. of the 25th Allerton Conference Univ. of Illinois, Urbana, Oct. 1987, 1998. [15] Shenker, “Making greed work in networks: A game- theoretic analysis of switch service disciplines,” IEEETNWKG: IEEE/ACM Transactions on NetworkingIEEE Communications Society, IEEE Computer Society and the ACM with its Special In- terest Group on Data Communication (SIGCOMM), ACM Press, vol. 3, 1995. [16] Aditya Akella, Richard Karp, Christos Papadimitrou, Srinivasan Seshan, and Scott Shenker, “Selfish behavior and stability of the internet: A game-theoretic analysis of tcp,” SIGCOMM, 2002. [17] Tim Roughgarden and Eva Tardos, “How bad is selfish routing?,” in IEEE Symposium on Foundations of Computer Science, 2000, pp. 93–102. [18] Tim Roughgarden, “Designing networks for selfish users is hard,” in IEEE Symposium on Foundations of Computer Science, 2001, pp. 472–481. [19] Elias Koutsoupias and Christos Papadimitriou, “Worst-case equi- libria,” Lecture Notes in Computer Science, vol. 1563, pp. 404– 413, 1999. [20] Kamal Jain and Vijay V . Vazirani, “Applications of approxima- tion algorithms to cooperative games,” in ACM Symposium on Theory of Computing, 2001, pp. 364–372. [21] Joan Feigenbaum, Christos H. Papadimitriou, and Scott Shenker, “Sharing the cost of multicast transmissions,” Journal of Com- puter and System Sciences, vol. 63, no. 1, pp. 21–41, 2001. [22] L. Kleinrock, Queueing Theory Volume 1, Wiley, 1967. [23] R. Gibbens and F. Kelly, “Resource pricing and the evolution of congestion control,” 1998. [24] Shadow Prices Proportional, “Rate control for communication networks:,” . [25] Rong Pan, Balaji Prabhakar, and Konstantios Psounis, “”CHOKe - A stateless queue management scheme for approximating fair bandwidth allocation”,” in INFOCOM, 2000. [26] R.J. Gibbens, S.K. Sargood, C. Van Eijl, F.P. Kelly, H. Az- moodeh, R.N. Macfadyen, and N.W. Macfadyen, “Fixed-point models for the end-to-end performance analysis of ip networks,” in Proceedings of the 13th ITC Specialist Seminar: IP Traffic Measurement, Modeling and Management, Sept 2000, Monterey, California, 2000. [27] Debojyoti Dutta, Ashish Goel, and John Heidemann, “Faster network simulation with scenario pre-filtering,” Tech. Rep., USC/ISI Tech Report 550, November 2001. APPENDIX A. Oblivious AQM and MAC Shenker [15] defines a class of allocation of functions called MAC that forms the basis of the analysis. Consider rates of agents and their buffer occupancy . Now any allocation is in MAC must have 1) for all and ! . 2) for all . We have the following observation: Theorem 5: Any oblivious router mechanism with av- erage bounded buffer occupancy cannot in MAC. Proof: Suppose an oblivious strategy satisfying the above is in MAC. Let and be the average queue length. Since we assume Poisson traffic sources, we can write as Now taking partial derivatives and noting that our router strategy is oblivious, we have & 1 , , & 1 , , (9) Now, for the above condition 0/ to hold, we have have . That implies , , On solving the above, we have , is a constant Now, is unbounded in the MAC framework. Hence must be unbounded. But we assume that is bounded. Hence, this is a contradiction. Thus, this AQM cannot be in MAC Since drop-tail and RED are oblivious, and ensure bounded average buffer occupancy, they cannot be in MAC. B. Drop Tail Lemma 3: In a M/M/1/K queue, the goodput increases as the offered load increases. Proof: Assume the service rate is unity. The good- put is given by 0/ 1 3 0/+1 /+1 Thus, /+1 / / Thus, we see that has always a positive derivative. Thus, goodput increases with offered load
Abstract (if available)
Linked assets
Computer Science Technical Report Archive
Conceptually similar
PDF
USC Computer Science Technical Reports, no. 758 (2002)
PDF
USC Computer Science Technical Reports, no. 763 (2002)
PDF
USC Computer Science Technical Reports, no. 779 (2002)
PDF
USC Computer Science Technical Reports, no. 752 (2002)
PDF
USC Computer Science Technical Reports, no. 831 (2004)
PDF
USC Computer Science Technical Reports, no. 822 (2004)
PDF
USC Computer Science Technical Reports, no. 776 (2002)
PDF
USC Computer Science Technical Reports, no. 877 (2006)
PDF
USC Computer Science Technical Reports, no. 786 (2003)
PDF
USC Computer Science Technical Reports, no. 825 (2004)
PDF
USC Computer Science Technical Reports, no. 802 (2003)
PDF
USC Computer Science Technical Reports, no. 742 (2001)
PDF
USC Computer Science Technical Reports, no. 817 (2004)
PDF
USC Computer Science Technical Reports, no. 695 (1999)
PDF
USC Computer Science Technical Reports, no. 661 (1997)
PDF
USC Computer Science Technical Reports, no. 677 (1998)
PDF
USC Computer Science Technical Reports, no. 688 (1998)
PDF
USC Computer Science Technical Reports, no. 687 (1998)
PDF
USC Computer Science Technical Reports, no. 675 (1998)
PDF
USC Computer Science Technical Reports, no. 692 (1999)
Description
Debojyoti Dutta, Ashish Goel, John Heidemann. "Oblivious AQM and nash equilibria." Computer Science Technical Reports (Los Angeles, California, USA: University of Southern California. Department of Computer Science) no. 764 (2002).
Asset Metadata
Creator
Dutta, Debojyoti
(author),
Goel, Ashish
(author),
Heidemann, John
(author)
Core Title
USC Computer Science Technical Reports, no. 764 (2002)
Alternative Title
Oblivious AQM and nash equilibria (
title
)
Publisher
Department of Computer Science,USC Viterbi School of Engineering, University of Southern California, 3650 McClintock Avenue, Los Angeles, California, 90089, USA
(publisher)
Tag
OAI-PMH Harvest
Format
9 pages
(extent),
technical reports
(aat)
Language
English
Unique identifier
UC16270145
Identifier
02-764 Oblivious AQM and Nash Equilibria (filename)
Legacy Identifier
usc-cstr-02-764
Format
9 pages (extent),technical reports (aat)
Rights
Department of Computer Science (University of Southern California) and the author(s).
Internet Media Type
application/pdf
Copyright
In copyright - Non-commercial use permitted (https://rightsstatements.org/vocab/InC-NC/1.0/
Source
20180426-rozan-cstechreports-shoaf
(batch),
Computer Science Technical Report Archive
(collection),
University of Southern California. Department of Computer Science. Technical Reports
(series)
Access Conditions
The author(s) retain rights to their work according to U.S. copyright law. Electronic access is being provided by the USC Libraries, but does not grant the reader permission to use the work if the desired use is covered by copyright. It is the author, as rights holder, who must provide use permission if such use is covered by copyright.
Repository Name
USC Viterbi School of Engineering Department of Computer Science
Repository Location
Department of Computer Science. USC Viterbi School of Engineering. Los Angeles\, CA\, 90089
Repository Email
csdept@usc.edu
Inherited Values
Title
Computer Science Technical Report Archive
Coverage Temporal
1991/2017
Repository Email
csdept@usc.edu
Repository Name
USC Viterbi School of Engineering Department of Computer Science
Repository Location
Department of Computer Science. USC Viterbi School of Engineering. Los Angeles\, CA\, 90089
Publisher
Department of Computer Science,USC Viterbi School of Engineering, University of Southern California, 3650 McClintock Avenue, Los Angeles, California, 90089, USA
(publisher)
Copyright
In copyright - Non-commercial use permitted (https://rightsstatements.org/vocab/InC-NC/1.0/