Greedy Selfish Network Creation * (full Version)

نویسنده

  • Pascal Lenzner
چکیده

We introduce and analyze greedy equilibria (GE) for the well-known model of selfish network creation by Fabrikant et al. [PODC’03]. GE are interesting for two reasons: (1) they model outcomes found by agents which prefer smooth adaptations over radical strategychanges, (2) GE are outcomes found by agents which do not have enough computational resources to play optimally. In the model of Fabrikant et al. agents correspond to Internet Service Providers which buy network links to improve their quality of network usage. It is known that computing a best response in this model is NP-hard. Hence, poly-time agents are likely not to play optimally. But how good are networks created by such agents? We answer this question for very simple agents. Quite surprisingly, naive greedy play suffices to create remarkably stable networks. Specifically, we show that in the Sum version, where agents attempt to minimize their average distance to all other agents, GE capture Nash equilibria (NE) on trees and that any GE is in 3-approximate NE on general networks. For the latter we also provide a lower bound of 3 2 on the approximation ratio. For the Max version, where agents attempt to minimize their maximum distance, we show that any GE-star is in 2-approximate NE and any GE-tree having larger diameter is in 6 5 -approximate NE. Both bounds are tight. We contrast these positive results by providing a linear lower bound on the approximation ratio for the Max version on general networks in GE. This result implies a locality gap of Ω(n) for the metric min-max facility location problem, where n is the number of clients.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Greedy Selfish Network Creation

We introduce and analyze greedy equilibria (GE) for the well-known model of selfish network creation by Fabrikant et al. [PODC’03]. GE are interesting for two reasons: (1) they model outcomes found by agents which prefer smooth adaptations over radical strategychanges, (2) GE are outcomes found by agents which do not have enough computational resources to play optimally. In the model of Fabrika...

متن کامل

Selfish Misbehavior in the Optimal Cross-Layered Rate Control of Wireless Networks

We consider the problem of selfish misbehavior in the optimal cross-layered rate control mechanism of wireless networks. Rate control algorithms of wireless networks are designed under the assumption that network hosts will follow the algorithm specifications. In this paper, we explain a scenario in which a selfish user achieves extra throughput by misleading the scheduling component of the net...

متن کامل

Selfish Overlay Network Creation and Maintenance

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for the case of cooperative peers and perform...

متن کامل

Basic Network Creation Games with Communication Interests

Network creation games model the creation and usage costs of networks formed by a set of selfish peers. Each peer has the ability to change the network in a limited way, e.g., by creating or deleting incident links. In doing so, a peer can reduce its individual communication cost. Typically, these costs are modeled by the maximum or average distance in the network. We introduce a generalized ve...

متن کامل

Enhancing Wireless Medium Access Control Layer Misbehavior Detection System in IEEE 802.11 Network

Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair throughput share. For example, IEEE 802.11 requires hosts competing for access to the channel to wait for a “back-off” interval, randomly selected from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012