1 / 32

Truthful and Non-Monetary Mechanism for Direct Data Exchange

Truthful and Non-Monetary Mechanism for Direct Data Exchange. I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson. Direct Data Exchange in Wireless D 2D Communications. Exchange data locally instead of getting all packets from the base station. A,B. A. B. A,B.

kael
Télécharger la présentation

Truthful and Non-Monetary Mechanism for Direct Data Exchange

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson

  2. Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A,B

  3. Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A B A,B

  4. Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A A B B A,B

  5. Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A A B A B B

  6. Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A A A B B B

  7. Benefits of Wireless P2P • Exchange data locally requires less power • Reduce power consumption • Reduce interference • Increase spatial reuse and hence total system capacity • Challenge: How to provide incentives for clients to cooperate?

  8. Network Model B B D B C D C C A A A D • Each client has all but one unique file, which it needs • The size of a file = Z bits • All clients can communicate with each other Need: D Need: C Need: B Need: A

  9. Incentive Model B B D B C D C C A A A D • Each client has a secret valuation vi ≤1 for its needed file • Each client pays some transmission cost for the amount of upload data v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1

  10. Incentive Model B B D B C D C C A A A D • The goal of a client: Maximize net utility vi1(receive file) - (amount of upload)/Z v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1

  11. Bidding Model B B D B C D C C A A A D • Each client submits a bid bi to a broker • The broker determines how much data a client uploads, and what packets it should uploads v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1

  12. An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4

  13. An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D)

  14. An Example B • D = (A+D)-A = (B+D)-B • Can obtain all bits of D C A b1 = 0.8 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D)

  15. An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D) D B A

  16. An Example v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1 Upload0.6Z Uploadnothing Upload0.6Z Upload0.4Z D B A

  17. Goal of this Work • Design a “truthful” broker policy • Truthful: Every client maximizes its utility by choosing bi = vi • The policy should also achieve high total net utility Why not simply apply VCG auction?

  18. Comparable by treating uploads as payments, clients that download files as winners

  19. Proposed Protocol • Every client submits a bid bi • Find the largest set S such that, for all i in S, bi≥ 1/(|S|-1) • S = {1,2,3}, b1,b2,b3≥ 1/2 • S = {1,2,3,4}, b4<1/3 • Largest set is {1,2,3} b1=0.7 b2=0.6 b3=0.6 b4=0.2

  20. Proposed Protocol • Every client submits a bid bi • Find the largest set S such that, for all i in S, bi≥ 1/(|S|-1) • Every client in S uploads Z/(|S|-1) bits containing a linear combination of all files that other clients in S needs • Each client in S receive Z bits, and hence can obtain the file it needs • Clients not in S do not obtain needed files

  21. Theorem: This protocol is truthful Note: The broker is only conceptual. The policy can be implemented in a distributed fashion by letting each client run the broker policy.

  22. Performance Analysis • Sort clients such that b1≥b2≥b3≥… • The set S must be the form of {1,2,…,n} • Client i does not obtain its file only if bi<1/(i-1) Theorem: In terms of total net utility, the difference between this protocol and one maximizing total net utility is at most 1+1+1/2+1/3+…+1/(N-1), where N is the number of clients

  23. Numerical Results • Assign vi to each client uniformly at random from [0,1] • Compare the difference in total net utility between our proposed protocol and a protocol that maximizes total net utility

  24. Extension: Dependency Graph • Some clients may not be able to exchange file • A client may miss some files that it does not need • Some clients may be too far away to communicate • Define a “dependency graph” • Each client is a node in the graph • Two nodes have an edge between them if the two clients can exchange needed files

  25. Solutions for Dependency Graph • Find the largest clique such that every node in the clique has bi≥ 1/(size of clique-1) • Each node in the clique uploads Z/(size of clique-1) bits • Repeat Step 1 Theorem: This protocol is truthful

  26. Extension: Some Clients Need the Same File Need: A bi =0.5 Need: A bi =0.3 Need: A bi =0.2 • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly

  27. Extension: Some Clients Need the Same File Need: A bi =0.5 Need: A bi =0.3 Need: A bi =0.2 • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly

  28. Extension: Some Clients Need the Same File • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly Need: A bi =0.6

  29. Summary • Study the problem of direct data exchange from the perspective of game theory • While the game looks like an auction, results of auction theory do not apply • Propose a non-monetary protocol that is truthful • The protocol can be extended to various scenarios

More Related