You are on page 1of 18

Computer Networks 67 (2014) 201–218

Contents lists available at ScienceDirect

Computer Networks
journal homepage: www.elsevier.com/locate/comnet

Client–server games and their equilibria in peer-to-peer


networks q
Iordanis Koutsopoulos a,c, Leandros Tassiulas a,b, Lazaros Gkatzikis b,⇑
a
Centre for Research and Technology Hellas, CERTH-ITI, Patission 76, 104 34 Athens, Greece
b
Department of Computer & Communication Engineering, University of Thessaly, Glavani 37 & 28 Octovriou, 38221 Volos, Greece
c
Department of Computer Science, Athens University of Economics and Business, Glavani 37 & 28 Octovriou, 38221 Volos, Greece

a r t i c l e i n f o a b s t r a c t

Article history: In peer-to-peer networks, each peer acts simultaneously as client and server, by issuing
Received 23 January 2013 and satisfying content requests respectively. In this work, we use concepts from non-coop-
Received in revised form 15 March 2014 erative game theory to model the interaction of autonomous peers. The client strategy set
Accepted 7 April 2014
consists of feasible request load splits towards servers, while the server strategy set is
Available online 20 April 2014
formed out of possible service disciplines on received requests. The performance metric
of interest is the average retrieval delay of content requests.
Keywords:
First, we assume preassigned fixed server policies (FIFO and priority) and study the
Peer-to-peer
Selfishness
emerging client request load splitting game. Peers are either egotistic (i.e. interested only
Two-level games in optimizing their own delay) or altruistic ones that also take into account delay incurred
to other peers. We consider best response updates to model iterative peer interaction. For
egotistic peers, we show that the sequence of best responses always converges to the
unique Nash Equilibrium Point (NEP). For altruistic peers best response updates converge
to one of the multiple NEPs exist, with each one being a global optimum for the FIFO case
and a local optimum for any other service strategy profile. We also consider mixed swarms
consisting of both egotistic and (partially-) altruistic peers and show an interesting transi-
tion from one to multiple NEPs. Next, we include service strategies in the peer strategy set.
Though with its service policy a peer cannot directly affect its delay, it can affect the result-
ing NEP. We devise two-level game models, where, at a first level, a peer selects its favor-
able service rule and then peers play a client load splitting game.
Ó 2014 Elsevier B.V. All rights reserved.

1. Introduction These networks often operate autonomously without


external coordination, and the network operational regime
Peer-to-peer networks gained momentum in the last is the outcome of spontaneous peer interaction. Under-
years for file sharing (BitTorrent), streaming media (Sop- standing the nature of these interactions and predicting
Cast), VoIP (Skype), decentralized content caching (Corelli), the operational regimes of the network as a whole are
and recently for distributed social networking (safebook). two primary objectives in distributed networked
environments.
In this work, we study a peer-to-peer network for con-
q
Part of the material in this paper has appeared in a conference tent sharing. Each peer operates simultaneously as server
version, in [24]. and client, by issuing and satisfying content requests
⇑ Corresponding author. Tel.: +30 2421074553. respectively. As client, it generates requests for content.
E-mail addresses: jordan@aueb.gr (I. Koutsopoulos), leandros@inf.uth. Each request is followed by an advertisement about peers
gr (L. Tassiulas), lagatzik@gmail.com (L. Gkatzikis).

http://dx.doi.org/10.1016/j.comnet.2014.04.005
1389-1286/Ó 2014 Elsevier B.V. All rights reserved.
202 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

Nomenclature

V the set of peers in a swarm ki load splitting strategy profile of peers other
ri mean request load of client i (hits/s) than i
Li mean size of requests by client i (bits/req) K ¼ ½k1 . . . kN T request splitting strategy of the net-
Cj upload capacity of server peer j (bits/s) work
lij average service rate of client peer i at server K request load splitting at the NEP
peer j (reqs/s) K0 request load splitting at network optimum
kij content request load of peer i addressed to ser- p ¼ ðp1 . . . pN Þ service disciplines of the servers
ver j Dij average retrieval delay per unit traffic of
qij ¼ kij =C j traffic intensity in server j due to the load peer i at server j
of peer i D ¼ ðDi . . . Du Þ vector of average retrieval delays
P
Kj ¼ Ni¼1 kij total content request load addressed to- Dtot total average network delay
wards server j
kj ¼ ½ki1 . . . kiN  request splitting strategy of client peer i

with that content in their possession. In BitTorrent, this is points are the Nash Equilibrium Points (NEPs) of a non-coop-
accomplished by the tracker that returns a random set of erative game. The social objective serves as a benchmark,
peers that have (part of) the object. For each request, the quantifying the performance loss of selfish interaction
client peer then decides on the peers from which it will compared to the social optimum. In this work, we consider
request the content. In advanced systems, a client may not only best response request load splitting but also ser-
even download different parts of an object from different vice strategies, we investigate their impact on average
peers. If time is expanded, the sum of the portions of the retrieval delay and characterize the resulting equilibrium
various requests of a peer that are addressed towards each points.
server forms the portion of the peer request load that is
routed towards each server. On the other hand, a peer acts
as server and serves received requests from other peers by 1.1. Our contribution
sending them the requested content based on a service
(scheduling) discipline. At the same time, a peer has its Our framework comprises small to moderate-sized
own requests served by other peers. In content sharing, a swarm networks consisting of nodes that engage in file
meaningful performance metric is the average retrieval sharing transactions. In that sense, the impact of a peer
delay of requests, namely the average time elapsed from strategy on others is non-negligible. The starting point of
the issue of a download request until the download has our models is the atomic splittable framework for selfish
been completed. routing over parallel links, where a link stands for a server.
In structured coordinated systems, a social objective that Each peer has a client strategy set of feasible request load
reflects global system operation is defined, such as minimi- splits towards servers, and a server strategy set of possible
zation of total average delay, and optimization-driven service disciplines on received requests. We consider the
algorithms delineate the means to achieve this objective performance metric of average retrieval delay.
through global coordination. However, peer-to-peer net- First, we assume fixed server strategies (First-In-First-
works may have no central operator and usually do not Out, or absolute priority) and study the client request load
adhere to global coordination towards a global social splitting game. Each peer splits its request load to servers
objective. Instead, peers interact autonomously and spon- so as to minimize its own average delay. Best response
taneously with each other. Thus, they selfishly decide on updates are used to model iterative peer interaction. We
their controls (strategies) so as to pursue their individual consider peer profiles ranging from selfish or egotistic,
performance objective—in our case, minimize their aver- where peers optimize only their own delay, up to benign
age retrieval delay. Each peer has a client strategy set con- or altruistic, where peers also take into account incurred
sisting of feasible request load splits towards servers, and a delays to others. We derive conditions and properties for
server strategy set which is formed out of possible service dis- NEPs and discuss convergence of the best response to the
ciplines on received requests. By a certain client strategy, a NEP. For egotistic peers, the NEP is unique regardless of
peer affects the total loads at different servers, and hence the server strategy, and the sequence of best responses
the delays of peers that seek service at these servers. Also, can be implemented based on localized delay measure-
by a certain server strategy a peer affects delays of peers ments. For the altruistic case under FIFO service, there
that seek service from it. Peers compete for server capacity exist multiple NEPs, and the sequence of best response
resources and selfishly readjust their strategies to improve updates converges to a NEP which is also a global opti-
their own delay. In such non-cooperative peer interactions, mum. For priority scheduling policies we also observe con-
it makes sense to study the resulting stable operating vergence of best response to one of the NEPs, which
points, namely peer strategies from which unilateral peer however are local minima. We show numerically that the
deviation does not improve performance. These operating price of anarchy is rather small. For the cases where both
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 203

egotistic and b-altruistic nodes coexist we characterize the problem, a static priority discipline, in line with the cl
transition from one to multiple NEPs. rule, is optimal. The authors proceed to convex relaxations
Next, we include server strategies in the strategy set. to solve this non-convex problem, and hence the optimal
With its service policy, a peer cannot directly affect its solution cannot be guaranteed. The case of FIFO scheduling
own delay, but it can affect its delay at the NEP after peers is studied in [2], where the major finding is that, at the
play a client load splitting game. The idea is that a peer i optimal solution, the customer types allocated to each ser-
should offer high priority to (and thus attract traffic from) ver have to be clustered in terms of first and second
those peers that are served with higher priority than i at moment of service times. However, these works do not
other servers, and which cause large delays to i. If peer i capture the specifics of peer-to-peer networking, namely
knows that j is served with higher priority than i at a server the double client–server role of peers and their tendency
k, it may decide to serve j with high priority. By advertising to selfishness.
lower delays to j, peer i may attract some traffic of j that In the context of peer-to-peer file sharing, fluid models
was going toward server k and thus improve its own delay and queueing theory have been extensively used. Work [3]
at k. We devise two-level game models, where at first level, models the collective behavior of peers as a closed queue-
a peer selects a service rule in terms of a convex combina- ing network with one queue per object, a queue service
tion of absolute service priorities, and subsequently peers rate depending on the number of object replicas, and one
play a client load splitting game. A sophisticated best queue representing query processing. In [4], the authors
response for a peer is to select a service strategy such that study peer selection for downloading and streaming con-
its delay at NEP after peers play the client load splitting tent to minimize required time and monetary cost for
game is minimized. This is the best choice available to i downloading, assuming that bandwidth prices are
at that moment. We also suggest various suboptimal heu- announced. In a similar setting, [5] brings the Internet Ser-
ristics for selecting a service discipline which require less vice Provider (ISP) dimension into picture and addresses
information to accomplish. the balance between minimizing the download delay in
The main contributions of our work can be summarized peer-to-peer communication and minimizing the tariffs
as follows: paid among different ISPs that carry P2P traffic among
themselves. The problem concerns coordinating the track-
 We formulate the double role of peers as clients (i.e. ers in the transient swarms to control the in- and out-flow
choosing the server to download from), and servers of P2P traffic from each swarm.
(i.e. selecting the service strategy) and investigate the Given that each peer is an autonomous and self-inter-
impact of both roles on performance. ested entity, game theory appears as a promising tool for
 We propose a game-theoretic model of peer interaction modeling behavior and interaction of peers. In this direc-
that captures a range of peer behaviors, ranging from tion, [6] presents a fluid model for BitTorrent which ana-
egotistic to altruistic, and we demonstrate how peer lyzes average file transfer time and discusses upload
behavior affects file retrieval delay. bandwidth control strategies that lead to Nash equilibria,
 We characterize the resulting equilibrium points and where the utility is the average download rate. Recent
quantify the performance loss arising due to selfishness work [7] investigates the scenario where peers selfishly
of peers. select to which other peers they connect. Compared to
our approach, the considered strategy space is significantly
The paper is organized as follows. Section 2 provides an smaller, since the exact allocation of requests to the con-
overview of related work. In Section 3, we present our nected peers is not captured. Besides, all these works [3–
peer-to-peer model and the assumptions made. Section 4 7] assume fixed service strategy.
is devoted to client load splitting games for given service To the best of our knowledge, only limited works have
disciplines, and in Section 5 we study client–server games, considered the server role of peers. In [8] the authors study
where the service policy is also part of a peer strategy. Sec- unilateral or bilateral network formation games, where
tion 6 includes extensive numerical evaluation of the pro- peers individually open up connections on multiple paths
posed schemes and Section 7 concludes our study. The or mutually agree on setting up paths respectively. Ref.
proofs of our theorems are provided in Appendix A. [9] addresses the problem of optimal multimedia P2P con-
tent exchange among a set of peers. The emphasis here is
on a resource reciprocation game. In that game, the strat-
2. Related work egy of each peer amounts to appropriate placement of
transmission effort (and resources) towards other peers
Modeling and performance evaluation of peer-to-peer in a group, according to the quality of multimedia content
networks can be performed through queueing theory tools received from those other peers.
under the premise that the server capacity is infinitely In this work, we propose a novel two-level repeated
divisible. Initial related results on abstract scheduling game framework that jointly captures (i) request load
problems date back to more a decade ago. Indicatively, splitting and (ii) service strategy, since both affect the
work [1] considers minimizing the total weighted delay resulting equilibria. The problem of request load splitting
for a system of customers and queues under non-preemp- to a set of server peers, faced by a set of client peers that
tive priority scheduling. The problem consists in (i) finding we consider, parallels that of selfish routing of several input
an allocation of customer traffic portions to queues and (ii) flows over shared paths, where each path link is associated
a customer sequencing order at each queue. For the latter with a latency function. In a non-atomic setting, each input
204 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

flow represents a large population of individuals, each of tion, payments, repeated peer interaction, intervention,
which controls a negligible amount of flow and myopically and enforced full sharing can be found in [23].
follows the path of minimum cost. Macroscopically, the
total input flow can be split over multiple paths, but the
3. System model
input flow cannot control the route of its constituent infin-
itesimal individuals. On the other hand, in an atomic set-
We consider a set N of N peers that form a small to
ting, each flow is a player which routes its traffic load
medium sized swarm and engage in long-term content
through only one path. For generic link cost functions, exis-
exchange transactions. Peers are non-cooperative. No sub-
tence of a NEP is guaranteed for the non-atomic case but
set of them coordinate or negotiate, and they do not con-
not for the atomic one unless all input flows are equal to
form to any incentive protocol. Each peer has some
each other (see [10, Chap.18] for a comprehensive survey
content in its disposal, which it may provide to others
on routing games and other results on generic and linear
upon request. At the same time, each peer places content
cost functions).
requests for obtaining content objects from other peers.
Further, in atomic splittable models, each flow is a
The performance metric for each peer is the average con-
player which may split its traffic across multiple paths
tent retrieval delay from other peers, a metric that has
under the criterion of optimizing its own cost. In the sem-
been extensively used in the literature for peer-to-peer file
inal work [11], the authors establish uniqueness of NEP for
sharing applications (e.g. [5,6,8,24]).
atomic splittable models and for a class of link cost func-
Content retrieval delay between a content requester
tions with some convexity properties, among which is
(client) peer and a provider (server) peer is the sum of net-
the average latency per unit flow for an M=M=1 queue with
work congestion delay, queueing delay and service delay.
FIFO service. However, convergence of best response
The first one is due to congestion conditions at the physical
updates to the NEP is formally proved only for the case
path that connect peers. The second one is due to queueing
of two users and two links.
of various requests at server peers, and the third one is due
The worst-case ratio between the social objective
to the server finite service capacity. In this work, we
evaluated at a NEP over that evaluated at the social opti-
assume that the bandwidth available at backbone links
mum is called price of anarchy [12]. This is studied in
that connect peers is large enough so that the effect of con-
[13,14] for routing games with non-atomic players. The
gestion on retrieval delay is negligible. We take into
price of anarchy is at most 4=3 for linear latency func-
account the queueing and service delays which arise due
tions regardless of the network topology. Bounds are also
to limited access link and upload bandwidth of peers. This
derived for latency functions that correspond to M=M=1
is very common in contemporary networks, where upload
and M=G=1 queue service (which may even grow
capacity is much smaller than download capacity (e.g., up
unbounded), under some assumptions on link load that
to 10 times smaller in ADSL). Though we assume that set N
prevent latency functions from being infinite. More
is fixed, the results extend to dynamic peer arrivals and
recently, the work [15] shows that the price of anarchy
departures.
for a non-atomic game with N parallel links, a single
input flow, and the class of unbounded latency functions
above is N. For the atomic splittable flow case, a bound 3.1. Peers as clients: content request load splitting strategies
of 2:618 exists on price of anarchy [16] with linear cost
functions but no such bound exists for other types of Each peer i as client is interested in content objects that
cost functions. The work [17] provides upper bounds reside in other peers. Each requested content object m by a
on price of anarchy for non-atomic users whose behav- peer i may reside in a subset of peers Am # N n fig. In the
ioral profile ranges from selfish to altruistic, depending long run, as the number of requested content objects
on whether or not the social welfare appears in their grows, these become indistinguishable. The stream of con-
objective, whereas a recent technical report [18] provides tent requests can be treated as a divisible fluid, and it can
a numerical evaluation of various regimes of peer coop- be assumed that content requests for peer i are addressed
eration and non-cooperation. towards the entire peer set N n fig. Such fluid models have
An important line of works study how to engineer effi- been extensively used to model content exchange in peer-
cient NEPs, a topic that is beyond the scope of this work. to-peer networks e.g. [35].
The works [20,21] respectively consider allocating addi- Under the premise above, each peer i has a content
tional capacity to links and controlling some amount of request generation rate from higher layer applications.
flow through a central manager in the model of [11]. Ref. For modeling and analytical tractability, we assume that
[22] approaches the problem of peer-to-peer content dis- the request load generation process at peer i follows Pois-
tribution and peer-to-peer services through cooperative son distribution with mean ri bits/s. The size of a request of
game theory. Specifically, appropriate incentive mecha- peer i is an exponential random variable with mean Li bits,
nisms are designed that ensure that users contribute and thus the request load of ri bits/s corresponds to a
resources. The key challenge addressed is that the reve- request rate equal to r i =Li requests/s. Each peer j has fixed
nues for the provider (due to operational cost reduction service rate (upload capacity) C j bits/s. The average service
for the system) are shared between the provider and the time per request of client peer i at server peer j is
users according to the extent that each user’s participation 1=lij ¼ Li =C j seconds per request. Here, we assume Li ¼ 1
contributes to the cost reduction. A comparative study of for all i, but our formulation can be modified to include dif-
different incentive schemes in P2P networks, like coopera- ferent average request sizes.
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 205

Fig. 1. A peer-to-peer system, with each peer i being simultaneously client and server. As client, peer i splits its content request load of rate r i among peers
j ¼ 1; . . . ; N; j – i. As server, peer i uses service capacity C i to serve incoming request load with a certain service policy.

A content request load splitting strategy for client peer i ority service. Work conservation also holds for average
is a vector ki ¼ ðkij : j 2 N n figÞ, where kij P 0 is the retrieval delays. That is, for each server j:
amount of content request load of peer i that is addressed
towards server j, and kii ¼ 0, for i ¼ 1; . . . ; N. The fraction of
X
N
Kj
qij Dij ¼ : ð1Þ
request load of peer i addressed towards peer j is kij =ri . The C j ðC j  Kj Þ
P i¼1;i–j
load splitting strategy is feasible if Nj¼1 kij ¼ ri . Denote by
F i the set of feasible load splitting strategies of peer i. However, the service policy of server peer j affects the
The fluid model above is general enough and captures also individual waiting time of peer i, Q ij . The following service
the scenario where a peer obtains different portions of a policies are considered:
distinct content object in parallel from different peers. A
feasible request load splitting strategy for the network is 3.2.1. FIFO scheduling
a matrix K with the ith row being ki . Let F be the set of fea- For FIFO scheduling policy at server j, the same average
sible network load splitting strategies, each of which needs retrieval delay is provided to all served clients i, i.e.
to satisfy the necessary and sufficient condition for server
P
stability, Ni¼1 kij < C j for j ¼ 1; . . . ; N. Kj 1
Q ij ¼ ; Dij ¼ : ð2Þ
Furthermore, we assume that network stability condi- C j ðC j  Kj Þ C j  Kj
PN PN P
tions, i¼1 r i < j¼1 C j and r i < N nfig C j for i ¼ 1; . . . ; N
hold. Let ki ¼ ðk1 ; . . . ; ki1 ; kiþ1 ; . . . ; kN Þ be a collective load
splitting strategy profile of peers other than i. Fig. 1 depicts 3.2.2. Preemptive priority scheduling
the content request load splitting of clients to servers. A server that employs a preemptive-resume priority
service discipline with given absolute priorities serves
incoming requests based on a certain priority ranking.
3.2. Peers as servers: service strategies The service of peer request load is interrupted whenever
request load from a peer of higher priority arrives, and it
For a given request load splitting strategy, let is resumed from the point it was interrupted when all
P
Kj ¼ Ni¼1 kij be the total content request load addressed higher priority request loads have been served [25].
towards server j, and let Ki j be the request load at server Besides being a reasonable service model, this policy can
j from peers other than i, so that Kj ¼ Ki j þ kij . For expo- be a good approximation for non-preemptive priority
nentially distributed request size, the service times are also scheduling policies in high load conditions with regard to
exponentially distributed. Thus, each server j can be mod- achievable delays.
eled as an M=M=1 queue with service rate C j (indicating An absolute priority service policy pj at server j is a rank-
upload capacity of peer j) that serves incoming requests ing of client set N n fjg. Let Mj be the set of ðN  1Þ! possi-
load Kj . The traffic intensity in server j due to the load of ble rankings of client peers. For a given ranking applied by
peer i is qij ¼ kij =C j , and the total traffic intensity at server server j, let pij denote the order of peer i in the ranking. A
P
j is qj ¼ Ni¼1;i–j qij . The average retrieval delay per unit traf- peer i is served with higher priority than peer ‘ at server
fic (bit) of peer i when serviced by peer j, Dij , is the average j if pij < p‘j . For a client i, a server j and some priority service
queueing delay per unit traffic at j, Q ij , plus the average policy, let Kiþ j be the total load that is served by server j
service delay, 1=C j . with higher priority than the load of i, namely
P
For each server j, the work conservation law says that, Kiþj ¼ k:pkj <pij kkj . Let pj be the service disciplines of peers
given load splits fkij gi¼1;...;N to j, the total average amount other than j and p ¼ ðpj ; pj Þ denote the ensemble of ser-
of work, namely the total average queue length of requests vice disciplines of all peers. Each priority ranking corre-
is the same regardless of the service discipline. Thus, if we sponds to a delay vector ðD1j ; . . . ; DNj Þ, where Dij is the
try to reduce the request queueing delay for a client, the average delay per unit traffic that peer i experiences in ser-
queueing delay of another client will increase. Work con- ver j. This depends on the priority pij that peer i enjoys in
servation holds for the M=M=1 queue with preemptive pri- server j and it is [26]
206 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

8
> 1
< C j kij ;
> if pji ¼ 1; 1 X N
1 X N X N
Dtot ¼ P r i Di ¼ P kij Dij : ð6Þ
Dij ¼  Cj ð3Þ i r i i¼1 i r i i¼1 j–i
>
>
  ; if pji > 1:
: C j Kiþ Cj Kiþ kij
j j

Note that Dij always depends on kij and on loads of peers 3.3.2. Download time
that are served at server j with higher priority than i, but On the other hand, analysis of content exchange at file-
not on loads of lower priority peers. Also, note that the level calls for a different approach. In contemporary peer-
expression for Dij for pji ¼ 1 emerges from that for pji > 1 to-peer file sharing systems like BitTorrent, each file is sep-
for Kiþ arated into several chunks and each is requested from a
j ¼ 0.
The set of possible service policies at server j is the set different peer. In this case, ri refers to the stream of chunks
of all possible mixtures of different absolute priorities pj , that peer i has to request from other peers so as to down-
( ) load the file under consideration and load splitting kij cor-
X
Pi ¼ am P 0; m 2 Mi : am ¼1 : ð4Þ responds to the portion of the specific file that is acquired
i i
m2Mi from peer j. Given that downloads from different peers
take place in parallel, the performance metric that consti-
The mixture denotes the portions of time where different tutes the objective of client peer i becomes:
absolute priority policies are applied. Clearly the entire set of
service policies at server j results in achievable delays that Di ðK; pÞ ¼ max kij Dij ðK; pj Þ ð7Þ
j2N nfig
form Cj , the convex hull of the set of client delay vectors Dm ,
each of which corresponds to a specific absolute priority In the following sections, we focus on the average con-
order m 2 Mj of clients. Let Cj be the set of achievable delay tent retrieval delay metric. However, most of derived
vectors by server j for all work-conserving scheduling poli- results also hold for the file-level approach.
cies. Then, it can be shown that Cj ¼ Cj [27]. That is, for any We summarize our notation in Nomenclature.
delay vector D corresponding to a work-conserving policy,
there exist positive reals fam g, m ¼ 1; . . . ; jMj j such that 4. Client (request load splitting) games
PjMj j m PjM j j
D ¼ m¼1 aj Dm , with m¼1j am
j ¼ 1. Namely, any delay vector
is achievable through an appropriate convex combination First, we fix the ensemble of service policies of servers,
(mixture) of delay vectors fDm g, each of which corresponds p ¼ ðp1 ; . . . ; pN Þ and consider the problem of request load
to an absolute priority order m. splitting of each client. In particular, we study the follow-
ing cases:
3.3. Retrieval delay metrics
1. All servers employ FIFO service.
The proposed framework is generic enough and hence 2. Each server j employs a given, arbitrary absolute prior-
enables modeling and analysis of peer-to-peer systems at ity scheduling pj .
different levels of abstraction. Initially, we devise a fluid
approach where average retrieval delay serves as the per- Hence, the strategy set of each peer i consists only of set
formance metric. Next, we demonstrate that a more F i . We consider best response peer strategy updates which
detailed file-level view is also feasible. arise naturally in autonomous, spontaneously interacting
non-cooperative peers. Each peer i computes the request
3.3.1. Average content retrieval delay load splitting strategy ki 2 F i that minimizes a perfor-
A macroscopic view of peer-to-peer systems enables us mance objective function, call it U i ðKÞ. In doing so, it affects
to characterize the long term behavior of the system. In this loads at different servers, and hence it affects the perfor-
context, content exchange can be viewed as the service of mance objective functions of other peers as well. These
the peer-generated streams of requests. Then, traffic split- in turn need to readjust their strategies to obtain the best
ting ki j corresponds to the portion of file requests generated instantaneously achievable outcome for them, and so on.
by peer i that are directed to peer j and we may denote by In order to capture a range of possible peer behaviors, we
Dij ðK; pj Þ the average retrieval delay per unit traffic experi- introduce the class of selfish load splitting policies, charac-
enced by client i at server j. This depends on the load at server terized by the following performance objective functions,
j (which in turn depends also on the loads routed by other parameterized by bi 2 R,
peers towards j) and on the service discipline pj of server j. b ri X rj
U i i ðK; pÞ ¼ P Di ðK; pÞ þ bi P Dj ðK; pÞ: ð8Þ
In this case, the performance metric that constitutes the k rk k rk
j–i
objective of client peer i is the total average retrieval delay,
which depends on the network request load splitting strat- For bi ¼ 0, client peer i is selfish or egotistic since it
egy and service disciplines p ¼ ðp1 ; . . . ; pN Þ at servers j, attempts to find a strategy ki that minimizes its own aver-
X
N age delay Di (i.e. first term) and is indifferent to delays
kij
Di ðK; pÞ ¼ Dij ðK; pj Þ: ð5Þ caused to others (i.e. second term). The corresponding best
ri
j–i response strategy updates are called egotistic. For bi ¼ 1,
The collective network performance is the vector of the peer is benign or altruistic; when it computes its opti-
average retrieval delays D ¼ ðD1 ; . . . ; DN Þ. The system-wide mal strategy, it also takes into account the impact of the
social performance metric is the total average network strategy on delays Dj ; j – i of other peers besides its own,
delay, Di . In this case, the performance objective of each peer i
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 207

Fig. 2. Diagram of two-level game-theoretic server-client interaction.


 
coincides with the system objective, i.e. U 1i ðÞ ¼ Dtot ðÞ. For K ¼ k1 ; . . . ; kN is a NEP if and only if conditions (11)
0 < bi < 1, client i’s behavior is between the two extremes and (12) are satisfied for all i ¼ 1; . . . ; N. Clearly, service
above. Parameter bi is private for each peer. policies p play a decisive role in the NEP. In general, for
For a given ensemble of service policies p and profile vec- each service policy p, a different NEP emerges for the client
tor b, a network load splitting strategy K ¼ ðk1 ; . . . ; kN Þ is a game.
Nash Equilibrium Point (NEP) for p, if no peer can benefit by A desirable attribute of the game is convergence of iter-
unilaterally deviating from the NEP, i.e. if for all i 2 N , ative best response strategy updates to a NEP. Best
b  b  response is the best myopic strategy of a peer for optimiz-
U i i ki ; ki ; p 6 U i i ki ; ki ; p ; ð9Þ ing delay, without taking into account potential updates of
for all ki – ki . We denote this NEP by K ðbÞ. Different val- others’ strategies in future moves, and it is a natural means
ues of b ¼ ðb1 ; . . . ; bN Þ yield different peer interactions for modeling spontaneous interaction. NEPs are therefore
and different NEPs. For instance, K ð0Þ (henceforth denoted predictions of collective stable behavior of rational peers.
as K ) is the NEP for egotistic peers, in which case Thus, it is desirable to establish that iterative best response
    updates converge to a NEP; this would then be the natural
Di ki ; ki ; p 6 Di ki ; ki ; p for all ki – ki and i 2 N .
system operating point.
4.1. Egotistic best response strategies
4.1.1. FIFO service
For b ¼ 0, each peer i faces the best response problem: Conditions (11) and (12) reduce to:
minDi ðki ; ki ; pÞ: ð10Þ
ki 2F i
C j  Ki
j
¼ mi ; if kij > 0; ð13Þ
Given the strategies ki of peers other than i, and for any r i ðC j  Kj Þ2
given ensemble of service policies p (e.g., FIFO or priority),
it can be verified from (3) and (5) that the average delay and 1=½ri ðC j  Kj Þ P mi if kij ¼ 0. Uniqueness of NEP for
Di ðÞ of peer i is a convex function of its strategy ki . This selfish routing to parallel links with a link cost function
establishes existence of a NEP in the load splitting game corresponding to a FIFO queue service was shown in [11].
[28]. The Kuhn–Tucker optimality conditions imply that Convergence of the sequence of best responses to NEP is
ki is the best response of i to ki if and only if there exist shown numerically but not formally, except for the two-
Lagrange multipliers mi and li ¼ ðlij : j 2 N n figÞ such user two-link case. Our client load splitting game, although
that: conceptually similar to selfish routing over parallel links,
@Di ðK; pÞ differs in the following. In [11], all links are available to
 mi  lij ¼ 0; j – i; ð11Þ all users, while in our game the subset of links (servers)
@kij
to which a user (client) can send flow is N n fig. In general,
X uniqueness of NEP for the case of restricted subsets of links
kij ¼ r i ; and lij kij ¼ 0; j – i ð12Þ
to which each user can split its flow cannot be guaranteed
j–i
[19]. However, for our game, it turns out we can slightly
with lij P 0; kij P 0 and mi the Lagrange multiplier that modify the proof in [11] and can show that the NEP is
P
corresponds to constraint j–i kij ¼ ri . A splitting strategy unique.
208 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

For each client peer i and server j, define C ij ¼ C j  Ki


j Theorem 1. For any network service policy p, the NEP for the
as the capacity of server j minus the total load of peers client request load splitting game is unique.
other than i destined towards j. Note that C ij depends only
on ki . Given ki , assume that i ranks servers j as
C i1 P C i2 P . . . P C iN . From KKT conditions for kij , peer i Proof 1. The proof is presented in Appendix A. h
finds its best response to the strategy ki of other peers To compute its best response, each peer i needs to know
as the waterfilling solution: capacities C j of servers j. This information is available in
pffiffiffiffiffiffi Ki
! contemporary peer-to-peer systems. Similarly to FIFO, at
C ij X ðnÞ
kij ¼ C ij  PK pffiffiffiffiffiffi C ij  r i ; if j 6 K i ; ð14Þ each iteration interval n, a peer i can measure Dij from dif-
i
j–i C ij j–i ðnÞ
ferent servers j. Since it knows kij , it can find C ij as the
ðnÞþ

ðnÞ 2 ðnÞ ðnÞ


positive root of equation Dij x  Dij kij x p Cffij ¼ 0. It then
 ffiffiffiffi
and kij ¼ 0 otherwise, where
P 9 ranks servers j in decreasing order of C þ ij = C j and derives
8 ðnþ1Þ ðnÞ
< pffiffiffiffiffiffi ‘
= its best response strategy ki to a given strategy ki of
j–i C ij  r i
K i ¼ max ‘ : C i‘ P P‘ pffiffiffiffiffiffi : ð15Þ others as:
: C ij ;
j–i pffiffiffiffiffi 0 K þi 1
C j @X þ
The machinery of best response goes as follows. Strat- kij ¼ C þij  PK þ pffiffiffiffiffi C ij  r i A if j 6 K þi ð16Þ
egy update by each peer takes place once in a given time
i
j–i C j j–i

interval. The interval can be taken to be large enough so


and kij ¼ 0 otherwise, where
that the condition above is satisfied. Synchronism in ( !)
pffiffiffiffiffi
updates of peers is not required. At interval n, a peer i mea- C‘ X‘
ðnÞ
sures average delay per unit flow, Dij that it experiences at
K þi ¼ max ‘ : C þi‘ P P‘ pffiffiffiffiffi C þij  r i : ð17Þ
j–i C j j–i
each server peer j. This can be measured easily through
certain fields in request and received data packets that The sequence of best response updates is again numer-
contain time instants when the request load packets were ically verified to converge to the NEP.
released and when content packets were received, as well
as the identities of servers. Peer i also knows its strategy 4.2. Altruistic best response strategies
ðnÞ ðnÞ ðnÞ ðnÞ ðnÞ ðnÞ
ki ¼ ðki1 ; . . . ; kiN Þ and it can deduce C ij as C ij ¼ kij þ
ðnÞ ðnþ1Þ
ð1=Dij Þ. It can then determine its best response, ki at We now consider altruistic peers, i.e. bi ¼ 1 for all i. All
n þ 1 through (14). Peer i relies only on local measure- peers know that they are altruistic. We study best response
ments for computing its best response. We have experi- policies where each peer finds its strategy ki by considering
mentally verified that the sequence of best response also its impact on average delays of other peers. For given
updates converges to the NEP, the stable operating point strategy profile ki , the best response policy of altruistic
with respect to unilateral peer deviations. peer i emerges as the solution of:
If ri ¼ r; C i ¼ C for all i, at the NEP it is kij ¼ N1
r
for all !
1 X X
i 2 N ; j – i, that is, each peer splits its request load equally min P kij Dij þ kkj Dkj ¼ min Dtot ðK; pÞ ð18Þ
to all servers. The client delays at NEP are Di ðK ð0ÞÞ ¼ k r k j–i
ki 2F i ki 2F i
k–i;j
1=ðC  rÞ for all i. In general, client delays at NEP are not
equal to each other. Note that the unsplittable one-to-
one assignment, where each client sends all load r to one 4.2.1. FIFO service
server, and each server receives the load of one client is Since Dtot ðÞ is convex function of ki , a NEP exists. One
not NEP. can show that Dtot ðÞ is jointly convex in K, since the Hes-
sian matrix of Dtot ðÞ is positive definite. The KKT condi-
tions for peer i give:
4.1.2. Priority service
Consider a given network service policy p other than Cj
¼ mi ; if kij > 0;
FIFO, so that service policy pj at server j is an absolute pri- ðC j  Kj Þ2
ority ordering. This is different than FIFO, since now each
Cj
client experiences different cost (average delay per unit P mi ; if kij ¼ 0: ð19Þ
traffic) at different servers due to different service priori- ðC j  Kj Þ2
ties at them. For each client i and server j define Peer i finds its best response to ki as:
Cþ iþ
ij ¼ C j  Kj to be the capacity of server j minus the peer pffiffiffiffiffi !
XLi
load routed to server j, which is served with higher priority Cj
kij ¼ C ij  PL pffiffiffiffiffi C ij  r i ; if j 6 Li ; ð20Þ
than i. Again C þ ij depends only on ki . Note that it may be
i
C j j–i
j–i
pji < pki but C þij < C þik , for some servers j; k. That is, although
peer i may enjoy higher priority at server j than at k, it may and kij ¼ 0 otherwise, where
be more beneficial for i to allocate more load to k rather 8 P  9

<  ri pffiffiffiffiffi=
j–i C ij
than j, since the aggregate higher priority traffic at server
Li ¼ max ‘ : C i‘ P P‘ pffiffiffiffiffi C‘ : ð21Þ
j may be more. The delay expression for fixed absolute pri- : j–i Cj ;
ority service is different than that for FIFO. However, we
can prove uniqueness of the NEP even for this general case. Each client i needs to know capacities C j of all servers j. At
ðnÞ
Thus, we have: each iteration n, a peer i can measure Dij from different
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 209

ðnÞ ðnÞ
clients j. Since it knows kij , it can find C ij as inpFIFO
ffiffiffiffiffi and Gauss–Seidel descent argument guarantees the existence
then it ranks servers in decreasing order of C ij = C j . Then of limit points of the best response sequence. The limit
ðnþ1Þ
it derives its best response strategy ki from KKT condi- points of best response updates are again NEPs of the
tions above. We now study NEPs and best response game, but they are now local minima of Dtot ðÞ. Our inten-
updates. sive numerical experiments indeed verify the existence of
Equal server capacities multiple NEPs with suboptimal performance, which are
If C i ¼ C for all i, the global problem can be also limit points of the best response sequence.
expressed as:

1 X
N
Kj 4.3. Best response strategies for heterogenous swarms
minDtot ðKÞ ¼ min P : ð22Þ
k rk C  Kj
K2F K2F
j¼1
The assumption of selfishness has been repeatedly
For this special case, the following theorem character- questioned by economists and psychologists due to innate
izes the limit points of the sequence of best response altruism observed in human beings [33,34]. Additionally,
updates. the lack of any incentive mechanism makes the scenario
of heterogenous peers, i.e. peers characterized by different
Theorem 2. Given that C i ¼ C for all i, any limit point of the levels of altruism, the most common in practice. Thus, a
sequence of best response updates, fKðkÞ gk¼1;2;... , is a NEP of swarm may consist of some egotistic and some altruistic
the altruistic client load splitting game and an optimal peers, or even peers exhibiting behavior between the two
solution to the global problem described by (22). extremes. We call the latter b-altruists with 0 < bi < 1.
Our previous analysis can be straightforwardly
extended to capture such scenarios, with the difference
that uniqueness of NEP cannot be guaranteed. However,
Proof 2. The proof is presented in Appendix A. h
our numerical results indicate that any swarm including
The altruistic game leads to multiple NEPs K that all
at least two fully altruistic peers has multiple NEPs, since
minimize Dtot ðÞ, and all NEPs induce the same server load
the existence of the fully altruistic peers guarantees that
vector v ¼ ðK1 ; . . . ; KN Þ. Vector v has some interesting
equivalent traffic splitting strategies exist. For swarms
properties.
consisting only of b-altruists, i.e. bi ¼ b 8i 2 N , we have
First we give a few definitions. For an N-dimensional
identified that when the FIFO service discipline is applied
vector a, let a0 denote the vector with the entries of a
we have a unique NEP for any b < 0:5, whereas for the pri-
arranged in decreasing order, i.e. a01 ¼ maxi ai , etc. Vector
ority service the transition to multiple NEPs can occur even
a is called lexicographically smaller than vector b, if either for smaller b values.
a01 < b01 or, for some i; 1 6 i < N it is a0j ¼ b0j for 1 6 j 6 i The cases of bi > 1 and bi < 0 may also arise in a net-
0
and a0iþ1 < biþ1 . A vector a is called more balanced than b
Pi Pi 0 work, indicating benign and malicious users respectively.
if ‘¼1 a‘ 6 ‘¼1 b‘ , for all i ¼ 1; . . . ; N.
0
Finally, a user may exhibit different behavior against dif-
The server load vector v at the NEP is the most balanced
P ferent peers, i.e. peer i may be altruistic regarding the delay
load vector, since it minimizes Ni¼1 GðKj Þ where GðÞ is any
of user j and egotistic towards another peer k. Such scenar-
nondecreasing strictly convex function [29], [30,
ios are beyond the scope of this work and thus not consid-
Theorem 7]. Furthermore, v is the lexicographically minimal
ered here.
vector.
If ri ¼ r for all i, the optimal average delays of all clients
are all equal to 1=ðC  rÞ. 5. Client–server games
Unequal server capacities
The proof outlined for the previous case cannot be We now consider the case where peers can change their
applied here. However, the sequence of best response service strategy in addition to the client request load split-
updates is in essence a sequence of Gauss–Seidel iterations ting strategy. Our objective is to devise game theoretic
for problem (18). Since Dtot ðÞ is jointly convex with respect models that capture the joint client–server strategy space
to K and convex with respect to ki for fixed ki , this of peers. We consider egotistic peers. A change of service
sequence converges to limit points that are global minima rule at servers leads to different advertised delays to cli-
of Dtot ðÞ [31, pp.219-221] and also NEPs of the altruistic ents, who in turn need to readjust their request load splits
game. in a best response fashion, so that they minimize their
delay for the new service regime. In section 4, a peer could
4.2.2. Priority service affect its delay by controlling the portions of content
For a given service profile p other than FIFO, altruistic request load addressed to different servers. But, how can
best response updates by peer i are optimization problems a peer really affect its own delay by altering its service
that are convex in peer i’s strategy ki . However, now the strategy?
expression for delay becomes more complicated and may Although a peer cannot affect its delay directly by
not be jointly convex in K. In its best response, each peer changing its service policy, it may select a service policy
i minimizes its own delay plus delays of peers that are such that the NEP after the next client request load split-
served with lower priority than i at different servers. ting game is most beneficial for the peer in terms of delay.
Besides server capacities, peer i needs to know the amount Suppose that at a NEP, peer i observes large delay Dij at
of higher priority traffic of each client ‘ at each server j. A some peer j, and it realizes that this is mainly due to a peer
210 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

k with large load kkj which is served by j with higher prior- Given the service policies pi of peers other than i, con-
ity than i. Then, peer i may decide to offer peer k higher pri- sider the problem faced by peer i. This consists in finding a
ority than before by changing its service discipline. At the service policy pi out of the set of possible ones,
next round of egotistic load splits, peer i will attract part ( )
of the request load of k, since k will selfishly split its
X
Pi ¼ am
i P 0; m 2 Mi : am
i ¼1 ;
request load toward peers that advertise low delays. As a m2Mi
result, peer i will have less load of higher priority of k to
confront at server j. Hence, delay Dij (and therefore Di ) will such that the delay Di at the NEP after the forthcoming cli-
be reduced at the resulting NEP. ent load splitting game is minimized. Set Pi encompasses
In Section 4, we defined the NEP for the client load split- absolute priority rankings of peers in N n fig (out of set
ting game for given server strategy profile p, call it Kp . We Mi of the ðN  1Þ! available ones), or mixtures of absolute
now generalize this definition as follows. A client load split- priority rankings.
P m
ting strategy and server strategy ðK ; p Þ ¼ ðk1 ; . . . ; kN ; The delay of peer k at server i is Dki ¼ m am i Dki , where,

p1 ; . . . ; pN Þ ðKp ; p Þ is a NEP

if for all ki – ki , pi – pi , and
 
according to (3),
all i 2 N ; Di ki ; ki ; pi ; pi 6 Di ki ; ki ; pi ; pi or equiva-

C
lently, if Dm
ki ¼
  i  ð24Þ
mkþ
C i  Ki C i  Kmkþ  kki
    i

Di Kðpi ;pi Þ ; pi ; pi 6 Di Kðpi ;pi Þ ; pi ; pi


  
ð23Þ
is the delay experienced by client k at server i for the spe-
cific service priority ranking m, and Kmkþ i the request load
for all pi – pi , and all i 2 N . That is, any change in the ser-
of peers of higher priority than k at server i for the priority
vice strategy of any peer i will result to a client game
ranking m.
whose NEP is characterized  by larger average
 delay for i
Peer i needs to go one step ahead and predict the client
than the current one Di Kðpi ;pi Þ ; pi ; pi .
 

NEP strategy, assuming that he selects service strategy pi .


Namely, it needs to find the NEP splits Kðpi ;pi Þ , namely
5.1. Service strategy selection in client–server games the splits ðkk‘ : k ¼ 1; . . . ; N; ‘ – kÞ for each peer k to each
server ‘ – k (including server i) for the subsequent client
We devise two-level games to capture the double cli- game. To do so, it uses KKT conditions (Appendix A.1) for
ent–server role of a peer. Peers take turns and the game each pair of client k and server ‘ – k and solves them to
goes as follows. At each iteration, a peer determines a best derive the client NEP as function of pi . At round n, a server
response service strategy and announces it to all. This ser- i chooses service policy
vice strategy is found so that the delay of that peer at the 
ðn1Þ

pðnÞ ¼ arg min Di Kðpi ;pi Þ ; pi ; pi
ðn1Þ
NEP after peers play the client game is as small as possible. i : ð25Þ
pi 2Pi
Subsequently, peers play a client load splitting game based
on this service profile and perform best response request Thus, peer i wishes to determine the best response ser-
ðnÞ
load splitting updates until convergence to the (pre-com- ver strategy pi consisting of the fractions allocated to dif-
puted) NEP. In the next round, another peer adjusts its ser- ferent priority rankings, am
i ; m ¼ 1; . . . ; jMi j, with
P m
vice policy, and peers again play the load splitting game m2Mi ai ¼ 1, so that its delay at NEP,

based on the new ensemble of server strategies, and so on. 1 X X m m


The model we consider is reminiscent of an extended
Di ¼ a D ð26Þ
r i j–i m2M j ij
j
version of two-level Stackelberg games [32]. In classic
 
Stackelberg games there exists one fixed dominant player, is minimum. Note that fractions am are implicit in
i
the leader, and other players, the followers. At the upper h   i1
m miþ 

layer, the leader attempts to minimize its cost subject to expressions Dij ¼ C j C j  Kj C j  Kmiþ
j  kij ,
all followers being in competitive equilibrium. After the since they affect allocated loads of all peers at different
leader selects its strategy, the followers at the lower layer servers j.
ðnÞ
play their game and reach equilibrium. The initial strategy Peer i announces strategy pi to all others. After that,
selection by the leader is done by foreseeing the equilib- peers play the client load splitting game and yield the
rium strategy of followers under a given leader strategy (anticipated) NEP. Next, at round n þ 1, another peer com-
and then optimizing the leader strategy. Clearly, the leader putes its best response service strategy by finding its own
strategy affects the follower equilibrium. fractions of different priority rankings so as to minimize its
In our case, a leader is a peer that chooses its service pol- own delay at the forthcoming client NEP, then peers play
icy. The followers are the clients that interact and reach equi- the splitting game, and so on. We assume that each peer
librium in their content request load splitting game, under chooses his service policy at least once within a given time

a given selected service strategy. The migration from the horizon. A NEP ðKp ; p Þ consists of a splitting strategy K

classical Stackelberg model lies in the fact that leaders vary and priority fractions p ¼ fam i : m 2 Mi ; i 2 N g and is

at each stage and also that leaders are part of the lower guaranteed to exist, since p can be viewed as a mixed strat-
level game. Each time a different peer takes turn and egy over the finite set of pure strategies, i.e. the different
selects its service strategy by optimizing its own derived possible priority rankings. Since the strategy space of each
delay at the NEP that will emerge after peers play the client peer i; Pi [ F i is compact and convex and the delay Di of
game. The sequence of moves in shown in Fig. 2. peer i at the client NEP is continuous function in P, the
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 211

Fig. 3. Performance of the network for different values of system utilization factor q.

sequence of server best responses delineated by client–ser- in decreasing order of metrics Hij or Hij . That is, the highest
ver games in Fig. 2 converges to an equilibrium. priority should be provided to the peer with the highest met-
   
Although for NEP ðKp ; p Þ with Kp ¼ ðkp1 ; . . . ; kpN Þ we ric value and so on. Alternatively, i may find a mixture of
p
have that each ki is a continuous function of p on absolute priorities with priority portions analogous to the
P1      PN , the computation of the best response server metrics above e.g. by assigning the priority fractions such
P
strategy pi by each peer i may require several computa- that m2P k am Hik
8k 2 N n fig, with P ki Mi the set
i ¼ PN
i Hij
tions and information that needs to be circulated. To j¼1

reduce computational burden, peers could consider only of priority orderings where peer k enjoys the highest priority
pure service strategies, namely absolute priority rankings. and so on. Alternatively, i could choose only a subset of
In that case, Pi includes only the ðN  1Þ! possible priority peers, e.g. those with the larger metrics and apply mixtures
rankings m ¼ 1; . . . jMi j. For each such priority ranking m, a of priority orderings based on the metrics above.
peer i runs a provisional client game and computes delay at
the NEP, Di ðmÞ. Then, it selects the service ranking 6. Numerical results
m ¼ arg minm Di ðmÞ. However, existence of NEP is not
guaranteed in that case. First, in order to obtain insight on the proposed game
Though a peer may improve its delay by modifying its models and the impact of various parameters on perfor-
service discipline, the best response service strategy may mance, we simulate using MATLAB a small system of
not be applicable due to increased complexity. Thus, in a N ¼ 5 peers. Further on in this section, we consider also
real system each peer i may perform heuristically good swarms of up to 50 peers, in order to demonstrate scalabil-
response service strategy updates based on heuristic met- ity of the proposed approach and to observe the impact of
rics for prioritizing peers, where no a priori computation swarm size on system performance.
of the system NEP is required. Peer i may compute these For better tractability of results we first consider a net-
metrics for j – i and find an absolute or mixed priority work where each peer i has service capacity C i ¼ 256 Kbps
ordering according to them. Such metrics are: and average request file size Li ¼ 1024 KB. These are typi-
cal values for home users (e.g. ADSL upload rate is of the
 A metric that quantifies total hindrance that peer j order of 1 Mbps) requesting small files or even chunks of
causes to i in all servers where j enjoys higher priority a bigger file. For request load vector ~ r ¼ ½1:6875; 1:6875;
than i: X 1:1250; 0:5625; 0:5625 (in requests/min), the global opti-
kj‘ mal solution balances the load across servers, i.e. it is
Hij ¼ : ð27Þ
j i
C‘ Kj ¼ 1:125 requests per minute for all j. However, this is
‘:p‘ <p‘
not always the case. For load vector ~ r ¼ ½5:5125; 0:2625;
Note that we normalize the load by the server capacity.
0:2625; 0:2625; 0:2625, at the optimal solution, the load
 A metric that captures total absolute delay reduction for
is not totally balanced, but is distributed across servers
peer i per unit of removed flow of peer j at various servers,
as follows: ½1:05; 1:38; 1:38; 1:38; 1:38, which is the most
given that j is served with higher priority than i at these
balanced traffic splitting. Actually in this case peers 2  5
servers. This metric is given by:
do not generate enough load to balance the effect of the
X @Di‘ actions of peer 1.
Hij ¼ ð28Þ In order to quantify the performance of the proposed
@k :
j i
j‘ schemes, we define the following performance metrics:
‘:p‘ <p‘

Both metrics attempt to quantify the gain of prioritizing a  Total Delay, Dtot ðK Þ. This is the total average network
specific peer. Thus, each server peer i should prioritize peers delay at the NEP.
212 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

 Price of Anarchy, PoA. This is a metric of the proximity Table 1


of the value of Dtot ðÞ at NEP K to its value at the global Total average retrieval delay (Dtot ) at NEP for different scenarios.

optimum K0 , i.e., it is FIFO Priority

 Egot. Altr. Prop. Egot. Altr.


Dtot ðK Þ
PoA ¼ 0
: ð29Þ q ¼ 0:4 21.284 21.156 25.175 21.255 21.159
Dtot ðK Þ
q ¼ 0:6 34.857 34.125 37.232 34.473 34.162
If several equilibria exist, the worst one, namely the one q ¼ 0:8 72.289 71.188 74.944 74.150 71.457

with the largest delay, is considered. ~


q ¼ 0:4 W 21.328 21.156 27.275 21.734 21.162
 Fairness Index, F. This is a measure of the dispersion of ~
q ¼ 0:6 W 34.644 34.126 45.882 35.516 34.188
delay values Di ðK Þ and is defined as follows: ~
q ¼ 0:8 W 72.109 71.188 1958.6 84.557 71.648

hP i2
N 
i¼1 Di ðK Þ
F¼ PN 2 
; ð30Þ
N i¼1 Di ðK Þ
and tries to keep it somewhat balanced. Eventually
although each peer attempts to minimize its own delay,
Notice that under FIFO scheduling optimum delay can an underlying coordination of peers occurs. This is not case
be easily calculated, since it coincides with the perfor- for the priority egotistic game though. Here we considered
mance of the altruistic scheme. This is also the optimum a swarm of users that are characterized by diverse request
of any priority service discipline, if the mean size of load and upload capacity profiles. The corresponding delay
requests Li is the same for all peers. For the general case performance of a uniform swarm would be the order of
though, the optimum cannot be always calculated. Instead, [26.7, 40, 80] min for q ¼ ½0:4; 0:6; 0:8 respectively. Thus,
the delay of an M=M=1 system of service capacity it is verified that diverse load/capacity profiles are benefi-
P
C ¼ Nj¼1 C j that serves all the requests provides a lower cial for the system.
bound of total average network delay Dtot . This bound is For high enough values of system utilization q, we
generally accurate for small swarms in the heavy load noticed that a high priority peer may select a strategy that,
regime. though feasible for itself may be infeasible for the system,
For comparison purposes, we consider also a one-shot leading thus to instability. This is indeed possible, since the
client load splitting strategy, namely a Proportional Scheme, delay of a high priority peer does not depend on others’
where each client allocates its request load to servers in selections, while his actions affect the delay of lower prior-
rC
proportion to server capacities, i.e. kij ¼ PNi j for j – i. ity peers. Thus, for q > 0:9, it is quite common that the set
C
k–i k
Whenever we refer to absolute priority service, we of feasible network load splitting strategies becomes
imply without loss of generality that priorities are assigned empty, since peers’ selected strategies do not satisfy neces-
according to the index of each peer. Thus, peer 1 always sary and sufficient conditions for stability. In other words,
enjoys the highest priority and peerPN N the lowest one. the system converges to an equilibrium point, where high
r i Li
The system utilization factor, q ¼ Pi¼1 N will also be used priority peers experience extremely low delays, while
C
j¼1 j
in our simulations to determine the request load vector. lower priority ones experience infinite delays which in
Finally, whenever we have multiple equilibria, depicted turn leads to infinite delay for the entire system as well.
values are the averages of several simulation runs. For This is also indicated in the following figures by the absence
the rest of this section, peers have different upload capac- of the corresponding points for high values of q. This phe-
ities ~
C ¼ ½128; 256; 640; 768; 768 (in Kbps), which for an nomenon does not appear in the FIFO egotistic scenario,
average request file size of L ¼ 1024 KB lead to a maximum since all peers work towards guaranteeing stability of each
supported load of [5.625,5.625,3.75,1.875,1.875] requests/ server.
min and equivalently to a utilization factor of q ¼ 1. Fig. 3a depicts the PoA of the client games as a function
of q. A value of PoA close to 1 means less divergence from
6.1. Client games with unconstrained requests the social optimum due to selfishness. For q > 0:94, no fea-
sible traffic splitting can be found in the priority egotistic
Initially, we consider the scenario of unconstrained scenario. As expected, altruistic games are characterized
requests, i.e. each peer can potentially address a portion by smaller PoA values, since each peer considers the effect
of its request load to any other peer. In the upper part of of its actions on others. All games have a PoA of less than
Table 1, we show the total delay performance at NEP for 1:46, i.e. lie within 46% of the optimum, whenever a feasi-
different load splitting strategies and different but fixed ble solution can be found. The proportional scheme per-
service strategies as function of the request load. As we forms significantly worse.
have shown in our analysis, the altruistic FIFO game gives On the other hand, from Fig. 3b, it can be deduced that
the system-wide optimal (minimum delay) performance. priority-based schemes become quite unfair as the load
Our simulations indicate that the egotistic FIFO game leads increases, since they tend to prioritize some peers at
to a NEP of near optimal performance (e.g. within 1–2%). the expense of others. For example, although Fig. 3a
This can be justified since all client peers, as they contend shows that for q ¼ 0:6, the altruistic games for FIFO and
for the resources of a specific server peer, experience same priority service have identical performance, individ-
average retrieval delay. Thus, whenever a peer selects its ual delays are quite different. Delay vectors of peers
traffic load splits, it considers the total load in each server at the NEP are: DFIFO ¼ ½32:3; 33:7; 35:7; 38:3; 33:3 and
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 213

Fig. 4. Average retrieval delay vs. behavior of nodes (b parameter).

DPr ¼ ½15:3; 33:4; 42; 55:7; 55:7 respectively. Thus, high general, the existence of at least two altruistic nodes leads
priority peers experience extremely low delays, compared to multiple NEPs. This is also evident from the plot for the
to the FIFO case where delays are quite balanced. This dif- priority service discipline. In the FIFO case, multiple NEPs
ference becomes more evident as the load increases. appear, but all have the same Dtot performance.
Next, we investigate the scenario of users exhibiting
6.2. The impact of altruism-parameter b behavior between the two extremes of egoism and full
altruism. We consider a swarm consisting of a number of
In this section, we consider the impact of peer behav- fully altruistic peers and some b-altruists. Fig. 4b depicts
ioral profiles, as these are captured by the b parameters, the scenario of four altruists and peer 1 characterized by
on the resulting equilibria. In the following figures, besides 0 6 b 6 1. We plot the Dtot metric and the delay of peer
the arithmetic mean of the considered performance metric, 1, i.e. the peer of highest priority. As the level of altruism
we depict the highest and the lowest values out of 2000 increases the individual performance degrades but the
simulation runs. This ‘variance’ serves among others as total delay remains unchanged. Interestingly, increasing
an indication of the existence of multiple NEPs. Initially, altruism causes also the increased variance for both the
we assume that only two types of peers exist, the egotistic FIFO and priority schemes.
and the fully altruistic ones of b ¼ 1. In Fig. 4a we show Fig. 4c depicts the delay performance of a network of 5
that the average retrieval delay of a P2P system decreases b-altruists. Here, a more significant impact on the total
with the number of altruistic peers. The ‘variance’ of Dtot is delay can be observed. In addition, the delay of the highest
a sufficient condition for the existence of multiple NEPs. In priority peer is no more monotonous in b, with maximum
214 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

Fig. 5. Performance vs. availability A. Higher A indicates greater content availability.

average delay observed for b ¼ 0:6. Fig. 4b and c indicates we get the delays shown at the bottom part of Table 1.
that uniqueness of NEP is guaranteed for b < 0:5 in the These results are not directly comparable to the previous
FIFO scenario, while the transition to multiple NEPs occurs ones, since they refer to a different, sparser overlay graph.
earlier for the priority scheme. The delay generally increases, since each peer has fewer
candidate neighbors to split its traffic to. Note that the
slight decrease of delay in some cases is attributed to the
6.3. Client games with constrained requests
fact that the system converges to a different NEP, since
the NEP is not unique anymore.
Previous results have been derived under the assumption
Next, in order to investigate the impact of content avail-
of unconstrained requests, i.e. a peer is interested in content
ability on system performance, we consider a swarm of
of any other peer. However, in reality, this is usually not the
N ¼ 50 peers. The upload capacity C of each peer is uni-
case. For example, there may be some rare files that are avail-
formly distributed in [128,1024] kbps and connectivity is
able only at a small number of peers. Such scenarios arise ~ is
randomly generated. The percentage of 1’s in matrix W
when a new file appears in the system, or when a file is not
indicative of content availability and we denote it with A.
popular. We capture such constrained scenarios by a binary
~ of zero diagonal. In essence, this is the adja- Fig. 5 depicts how PoA, fairness and average retrieval
N  N matrix W
delay evolve as content progressively becomes available.
cency matrix of the overlay graph. Element Wij indicates
We start from a limited connectivity scenario of A ¼ 2%
whether peer i is interested in j’s content. Thus, each client
with Wi iþ1 ¼ 1 8i, whereas the rightmost point corre-
peer i may split its request load only to the set of peers
sponds to the unconstrained case. Fig. 5a reveals that all
fj : Wij ¼ 1g. For the arbitrary matrix
schemes perform close to the optimal. There are instances
2 3 though, where limited content availability causes notice-
0 1 1 0 1 able performance degradation to the egotistic approaches.
6 7 Performance degradation of selfish approaches holds in
61 0 0 1 17
6 7
~ ¼ 60
W 1 0 1 07 general for scenarios of low to medium availability. Inter-
6 7;
6 7 estingly, at the extreme where only a few peers posses
41 0 0 0 15
each object, load splitting cannot be performed in many
0 1 1 0 0 ways, and hence selfish splitting is very similar to the opti-
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 215

it can split its requests to; this information is available at


contemporary peer-to-peer networks through content dis-
covery mechanisms. The introduction of matrix W ~ may also
capture peer dynamics, i.e. peers entering or leaving the
system. When a newcomer k requests an object, a new
row is added in W ~ . Besides, future requests for k’s content
will update the matrix by adding 1’s in respective posi-
tions. The event of a peer leaving the system is equivalent
to elimination of its row and column.
In addition, availability matrix enables us to model free-
riding behavior, i.e. peers that are not willing to provide
any content/upload capacity to others. In particular, for
each freerider the corresponding column is a zero vector
since no other peer can have part of his requests satisfied
there. As expected, we observe in Fig. 6 that freeriding
causes significant performance degradation for all the
schemes.
Fig. 6. The impact of freeriding on delay performance Dtot . From the hitherto numerical study, one might claim
that the FIFO egotistic approach always exhibits near-
optimal performance, since it seems to guarantee
mal one. The same holds also for the case of full availabil-
both near-optimal delay and fairness. However, if we
ity, where the load is equally balanced even under
consider peers of different average request sizes, say
selfishness. ~
L ¼ ½0:5; 7; 30; 200; 700 MB, corresponding to users that
In Fig. 5b, we see that all schemes generally become
are interested in different types of files ranging from sim-
more fair as availability increases. This is expected, since
ple documents up to movies, we get significantly higher
each peer has more options to split its traffic to, and hence
delays at the FIFO NEP than that of the priority schemes
the traffic at NEP becomes more balanced among servers.
(see Fig. 7a). By prioritizing peers that request small files
The relative fairness of the various schemes is not affected
as cl rule dictates [1], we may get significantly lower delay
by content availability, except for the extremely sparse
per request. In other words, in order to minimize the mean
scenarios where the choices are so limited that all schemes
waiting time per request (or equivalently maximize the
perform identically. Fig. 5c we depict the impact of content
number of requests that get served per unit of time), we
availability on average retrieval delay. As availability
need to apply the Shortest Expected Processing Time
increases, the average delay decreases significantly. How-
(SEPT) service discipline, i.e. prioritize peers in order of
ever, under priority service and egotistic behavior, increas-
increasing Li . However, this approach may cause significant
ing availability may also have the opposite result. Such a
increase in the waiting time of requests for bigger files.
scenario arises when high priority peers exploit all the
available servers and hence cause significant performance
degradation to lower priority ones (as depicted for avail- 6.4. The impact of service strategy
ability of 12%).
Notice that availability matrix is a structure that allows On the other hand, if we cannot provide incentives to
us to model evolution of contacts among peers. Each peer the peers to assign the priorities the proper way, we may
needs to know only its own row, i.e. the set of peers that experience significant performance degradation. For exam-

Fig. 7. Average retrieval delay for requests of different sizes.


216 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

ple, in Fig. 7a we present the worst case performance, the other hand, the performance of the individuals changes
achieved by assigning the priorities inversely to what the significantly, but in general we cannot predict who will
cl rule dictates. Finally, in Fig. 7b we demonstrate that finally benefit. Each peer enjoys some performance gain
all the proposed schemes are also applicable in larger net- only for limited time, namely until the rest of peers reply
works. For comparison purposes, we depict also the lower by changing their own service disciplines.
bound of delay resulting from the single server abstraction
of the P2P system. Although the number of participating
peers has minor impact on system performance at the 7. Conclusion
resulting equilibria, we observe that the lower bound is
only meaningful for small enough swarms. In this work, we investigated the double client–server
role of peers and characterized the NEPs emerging from
best response strategy updates. The peer strategy set com-
prises client request load splits alone, or together with ser-
6.5. Client–server games vice strategies. Interestingly, we have demonstrated that
the service discipline is part of a peer’s strategy since it
For the two-level client–server games, we need a small implicitly determines its own performance. The proposed
enough network so as to be able to track the two-level peer framework can model swarms of any size, as long as each
interactions. Thus, we simulate a network of N ¼ 3 peers peer controls a positive, non-negligible amount of request
with capacities ~ C ¼ ½384; 256; 128 and low enough loads, rate.
~
r ¼ ½0:6563; 1:0313; 1:1250 to guarantee stability. In In addition, our model captures a range of peer behav-
Table 2, we depict results on total average and individual iors, ranging from egotistic up to altruistic. Our results
peer delays at the NEP. All peers are fully egotistic, but reveal how that range is depicted into file retrieval delay.
for comparison purposes we also provide the NEP delays We also dealt with the system collective behavior in terms
for the altruistic scenario. of equilibria for different populations of altruistic and ego-
Initially, peers have no information about the network tistic peers and we demonstrated that introducing altruism
and hence all apply FIFO discipline. The resulting delays causes a transition from one to multiple equilibrium
at NEP are presented in the second column. Once a peer points. In this work, we have assumed that peer behavior
(say peer 1) has collected sufficient data, it may decide is determined by their level of altruism. However, the
to change its service strategy. Peer 1 determines its best employment of reputation methods for gradually revealing
response service policy from 25 and subsequently clients peer profiles and guiding the system to efficient equilibria
play the load splitting game. The resulting delays at NEP is interesting topic for future study.
are shown in column BR1. Our simulations show that
peer 1 will give absolute priority to peer 3. Thus, at
the resulting NEP peer 1 manages to improve his delay Acknowledgements
(49:23 units) by modifying his service discipline. We
obtain similar results when peer 1 selects his new ser- I. Koutsopoulos acknowledges the support of ERC08-
vice discipline based on the proposed heuristics (this is RECITAL project, co-financed by Greece and the European
not depicted in the table). In the next round, another Union (European Social Fund) through the Operational Pro-
peer may modify its service discipline until convergence. gram ‘‘Education and Lifelong Learning’’-NCRF 2007–2013.
Such games in general have multiple equilibria to which The work of L. Tassiulas was supported by the project
the client–server best response (BR) updates converge. As SOFON which is implemented under the ‘‘ARISTEIA’’ Action
anticipated, the Hij -based heuristic does not always con- of the Operational Programme ‘‘Education and Lifelong
verge to an equilibrium, while the Hij -based one has a Learning’’ and is co-funded by the European Social Fund
stationary point, albeit different from the BR equilibrium. (ESF) and National Resources.
In the specific scenario though all games converge, and
the performance at the resulting NEPs is depicted in
the last three columns. Appendix A. Proof of Theorem 1
From the above, it can be deduced that if each peer is
allowed to selfishly select its service strategy, the system ~ be two NEPs. We will prove that K ¼ K.
Let K, K ~ The KKT
performance degrades, but interestingly, not much. On conditions for K for the average delay imply that
Cj
2
¼ mi ; if kij > 0; ðAppendixA:1Þ
r i ðC j  Kiþ
j  kij Þ
Table 2 2
Client (FIFO) games and client–server games. and C j =½r i ðC j  Kiþ
j Þ  P mi , if kij ¼ 0, for i 2 N . Similar con-
ditions (with different multipliers m ~ Similarly
~i ) hold for K.
Client (FIFO) Client–server
in rationale with [11, Th.2.1], we prove that for each client
Altr. Egot. BR1 BR Hij Hij i, and for each j – i,
Dtot 58.25 58.39 62.48 60.02 63.06 60.24
~ iþ P Kiþ imply that ~kij 6 kij
m~i 6 mi and K
D1 62.54 66.42 49.23 56.14 51.54 57.51 j j
D2 60.47 55.83 100.3 91.21 44.56 50.68 ~ iþ 6 Kiþ imply that ~kij P kij
D3 53.71 56.05 35.55 33.68 86.75 70.60
m~i P mi and K j j
I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218 217

X
Next, the proof differs from [11]. For some client k, ~ ¼
DðKÞ  DðKÞ ðK2j  K
~ 2Þ
j
1 ~ kþ > Kkþ g; N 2 ¼ N  N 1 .
define server sets N k ¼ fj : K j j k k
j2N nfig
0
~i > mi g. For i 2 N 0 ; i R N 0 respectively,
Let N ¼ fi 2 N : m X h i
¼ K2j  K
~ 2  2rðKj  K
j
~ jÞ
it is: j2N nfig
X X X X X h i
~kij ¼ ri  ~kij 6 r i  kij ¼ kij ðAppendixA:2Þ ~ j  rÞ2
¼ ðKj  rÞ2  ðK
j2N 1k j2N 2k j2N 2k j2N 1k j2N nfig
X
X X X X X P ~ j Þ2 P max jKj  K
ðKj  K ~ j j2
~ kþ ¼
K ~kij 6 kij j2N nfig
j j2N nfig
j2N 1k j2N 1k i:pj <pj j2N 1k i:pj <pj
i k i k
X ¼ max jkij  ~kij j2 ¼ jjK  T i Kjj2
¼ Kkþ
j : ðAppendixA:3Þ j2N nfig

j2N 1k
where the first inequality holds since r P K ~ j for all j.
1
The last inequality contradicts the definition of N k , h
1
which means that N k is an empty set. Similarly, set For C i ¼ C; DðKðkÞ Þ is monotone non-increasing with k,
~ kþ kþ
fj : Kj < Kj g is empty. Thus, we have that for every ser- since DðKÞ  Dð T e i KÞ P 0 from Lemma 1.
~ kþ ¼ Kkþ for any client k. We proceed to show
ver j, it is K j j Then we show the convergence of the iterative proce-
that m~i ¼ mi for each i. Thus, we get that ~
kij ¼ kij for every i dure. Since DðÞ is a nonnegative and continuous function,
and j, which implies that the NEP is unique. we have that limk!1 ðDðKðkþ1Þ Þ  DðKðkÞ ÞÞ ¼ 0. In addition,
we have limk!1 DðKðkÞ Þ ¼ DðK Þ for any limit point K of
Appendix B. Proof of Theorem 2 KðkÞ ; k P 0. From Lemma 1, it follows that
limk!1 jKðkþ1Þ  KðkÞ j ¼ 0. Since mapping T i is continuous
The problem described by (22) falls within the class of for all i, we have T i K ¼ K for any i and any limit point
problems: K . This means that no peer i can benefit from unilaterally
deviating from K , hence K is a NEP for the altruistic split-
X
N
ProblemðPÞ : min DðKÞ ¼ min GðKj Þ ðAppendixB:1Þ ting game. Since T i K ¼ K for all i, K is a stationary point
K2F K2F
j¼1 of Dtot ðÞ. Since Dtot ðÞ is jointly convex with respect to K, a
stationary point of Dtot ðÞ is a global optimal solution to
where GðÞ is a strictly nondecreasing convex function of
problem described by (22).
load Kj at server j. For problem (P), we have [29,
Corollary 4]:
References
Fact 1. A feasible network load splitting policy K is solution to
(P) for a given strictly convex function GðÞ if and only if it is a [1] J. Sethuraman, M. Squillante, Optimal stochastic scheduling in
multiclass parallel queues, in: Proc. ACM SIGMETRICS, 1995.
solution to problem (P) for all convex functions. [2] S. Borst, Optimal probabilistic allocation of customer types to
servers, in: Proc. ACM SIGMETRICS, 1995.
In the sequel, we use function GðxÞ ¼ x2 . A solution to prob- [3] Z. Ge, D.R. Figueiredo, S. Jaiswal, J. Kurose, D. Towsley, Modeling
lem (P) with GðxÞ ¼ x2 is solution to (P) for any other con- peer-peer file sharing systems, in: Proc. IEEE INFOCOM, 2003.
[4] M. Adler, R. Kumar, K. Ross, D. Rubenstein, T. Suel, D.D. Yao, Optimal
vex function GðÞ and thus a solution to (22). For a feasible peer selection for P2P downloading and streaming, in: Proc. IEEE
network splitting strategy K 2 F and client i, the altruistic INFOCOM, 2005.
best response is a strategy T i K, where T i is an operator on [5] P. Parag, S. Shakkottai, I. Menache, Service routing in multi-ISP peer-
to-peer content distribution: local or remote?, in: Proc. ACM
K, with T i K ¼ arg minki 2F i DðKÞ, while strategies ki are Gamenets, 2011, pp. 353–368.
kept fixed. Let Kð0Þ be an initial load splitting strategy, [6] D. Qiu, R. Srikant, Modeling and performance analysis of BitTorrent-
and let fik gkP1 be a sequence of client indices. Assume like peer-to-peer networks, in: Proc. ACM SIGCOMM, 2004.
[7] T. Moscibroda, S. Schmid, R. Wattenhofer, Topological implications
there exists an integer D such that for any integer ‘ and
0 0 of selfish neighbor selection in unstructured peer-to-peer networks,
any i 2 N , it is ik ¼ i for some k with ‘ 6 k 6 ‘ þ D. In other Algorithmica 61 (2) (2011) 419–446.
words, all clients should make an update within a finite [8] H. Zhang, G. Neglia, D. Towsley, G. Lo Presti, On unstructured file
period of D iterations. Define the sequence of assignments sharing networks, in: Proc. IEEE INFOCOM, 2007.
[9] E.MaaniZ. Chen, A.K. Katsaggelos, A game theoretic approach to
fKðkÞ ; k P 0g recursively as Kðkþ1Þ ¼ T ik KðkÞ . We follow the video streaming over peer-to-peer networks, Signal Process.: Image
rationale in [29] with all necessary modifications. We first Commun. 27 (5) (2012) 545–554.
prove the following lemma. [10] N. Nisan, T. Roughgarden, E. Tardos, V.V. Vazirani (Eds.), Algorithmic
Game Theory, Cambridge University Press, 2007.
[11] A. Orda, R. Rom, N. Shimkin, Competitive routing in multiuser
Lemma 1. Suppose C i ¼ C for all i. Let K, K ~ be feasible communication networks, IEEE/ACM Trans. Network. 1 (5) (1993)
strategies based on K and T i K respectively. For K 2 F and 510–521.
[12] C. Papadimitriou, Algorithms, games and the internet, in: Proc. ACM
i 2 N , define jjK  T i Kjj ¼ maxj2N jkij ðKÞ  kij ðT i KÞj. Then, Symp. Th. of Comput., 2001.
[13] T. Roughgarden, E. Tardos, How bad is selfish routing, J. ACM 29
jjK  T i Kjj2 6 DðKÞ  DðKÞ:
~ ðAppendixB:2Þ (2002) 235–259.
[14] T. Roughgarden, The price of anarchy is independent of the network
topology, J. Comput. Syst. Sci. 67 (2) (2003) 341–364.
Proof 3. Let Kj and K ~ j be the loads of server j according to [15] T. Wu, D. Starobinski, On the price of anarchy in unbounded delay

K and K. ~ Since it is P kij ¼ P ~ networks, in: Proc. ACM GameNets, 2006.


P j–i j–i kij ¼ r i , we get [16] B. Awerbuch, Y. Azar, A. Epstein, The price of routing unsplittable
~
j2N ðKj  Kj Þ ¼ 0. Define r ¼ minj Kj . We have, flow, in: Proc. ACM Symp. on Theory of Comp. (STOC), 2005.
218 I. Koutsopoulos et al. / Computer Networks 67 (2014) 201–218

[17] P.-A. Chen, D. Kempe, Altruism, selfishness, and spite in traffic Leandros Tassiulas obtained the Diploma in
routing, in: Proc. 9th Conf. Electr. Commerce (EC), 2008. Electrical Engineering from the Aristotelian
[18] A. Prakash Azad, E. Altman, R. El-Azouzi, Routing Games: From University of Thessaloniki, Greece in 1987,
Egoism to Altruism, INRIA Tech. Report No. 7059, Oct. 2009. and the M.S. and Ph.D. degrees in Electrical
[19] L. Libman, A. Orda, Atomic resource sharing in non-cooperative Engineering from the University of Maryland,
networks, Telecommun. Syst. 17 (4) (2001) 385–409. College Park in 1989 and 1991 respectively.
[20] Y.A. Korilis, A.A. Lazar, A. Orda, Capacity allocation under He is Professor in the Dept. of Computer and
noncooperative routing, IEEE Trans. Aut. Contr. 42 (3) (1997) 309– Telecommunications Engineering, University
325. of Thessaly, since 2002. His research interests
[21] Y.A. Korilis, A.A. Lazar, A. Orda, Achieving network optimal using
are in the field of computer and communica-
Stackelberg routing strategies, IEEE/ACM Trans. Network. 5 (1)
tion networks with emphasis on fundamental
(1997) 161–173.
[22] V. Misra, S. Ioannidis, A. Chaintreau, L. Massoulie, Incentivizing peer- mathematical models, architectures and pro-
assisted services: a fluid shapley value approach, Proc. ACM tocols of wireless systems, sensor networks, high-speed Internet and
SIGMETRICS Perform. Evaluat. Rev. 38 (1) (2010) 215–226. satellite communications. Prof. Tassiulas is a Fellow of IEEE. He received a
[23] J. Park, M. van der Schaar, A game theoretic analysis of incentives in National Science Foundation (NSF) Research Initiation Award in 1992, an
content production and sharing over peer-to-peer networks, IEEE J. NSF CAREER Award in 1995, an Office of Naval Research, Young Investi-
Select. Topics Signal Process. 4 (4) (2010) 704–717. gator Award in 1997 and a Bodosaki Foundation award in 1999. He also
[24] I. Koutsopoulos, L. Tassiulas, L. Gkatzikis, Client and server games in received the INFOCOM 1994 best paper award and the INFOCOM 2007
peer-to-peer networks, in: Proc. IEEE Int. Workshop on Quality of achievement award.
Service (IWQoS), 2009.
[25] D. Bertsekas, R. Gallager, Data Networks, Prentice Hall, 1992.
[26] I. Adan, Queueing Theory Course: Lecture Notes, Eindhoven Univ. of Lazaros Gkatzikis obtained his Ph.D degree
Technology, available online: <http://www.win.tue.nl/
iadan/que/ from the Department of Computer Engi-
>.
neering and Communications, University of
[27] S. Borst, L.C.M. Kallenberg, G.M. Koole, Stochastic Operations
Thessaly. Since 2008, he participates in R&D
Research 2: Stochastic Dynamic Programming and Control of
projects FP7 STREP projects OPNEX, CONECT,
Queues’’, Lecture Notes, CWI, Amsterdam.
[28] J.B. Rosen, Existence and uniqueness of equilibrium points for as an external researcher of the Centre for
concave n-person games, Automatica 33 (3) (1965) 520–534. Research & Technology Hellas, Institute for
[29] B. Hajek, Performance of global load balancing by local adjustment, Telematics and Informatics. He has also
IEEE Trans. Inf. Theory 36 (6) (1990) 1398–1414. received a PhD scholarship from the NSRF-
[30] L. Georgiadis, L. Tassiulas, Optimal overload response in sensor Heraclitus II program. His research interests
networks, IEEE Trans. Inf. Theory 52 (6) (2006) 2684–2696. include game theory, optimization tech-
[31] D. Bertsekas, J. Tsitsiklis, Parallel and Distributed Computation: niques and peer-to-peer network perfor-
Numerical Methods, Athena Scientific, 1997. mance analysis.
[32] H. van Stackelberg, The Theory of Market Economy, Oxford
University Press, 1952.
[33] S.C. Kolm, J.M. Ythier, Handbook of the Economics of Giving,
Altruism and Reciprocity: Foundations, North Holland, 2006.
[34] H. Gintis, Moral Sentiments and Material Interests: The Foundations
of Cooperation in Economic Life, The MIT Press, 2005.
[35] W. Saad, Z. Han, T. Basar, M. Debbah, A. Hjorungnes, A coalition
formation game in partition form for peer-to-peer file sharing
networks, in: Proc. IEEE GLOBECOM, 2010, pp. 1–5.

Iordanis Koutsopoulos is currently Assistant


Professor at the Department of Computer
Science, Athens University of Economics and
Business, Greece. He obtained the Diploma in
Electrical and Computer Engineering from the
National Technical University of Athens, and
the M.S and Ph.D degrees in Electrical and
Computer Engineering from the University of
Maryland, College Park (UMCP). He has been
awarded the Marie Curie International Rein-
tegration Grant (IRG) and participated in a
variety of projects such as EU FET STREP NET-
REFOUND, FP7 NCRAVE, FP7 OPNEX, and the Networks of Excellence
(Euro-NGI and NEWCOMM). Currently, he is currently the technical
coordinator of FP7 CONECT project.

You might also like