320 likes | 432 Views
Truthful and Non-Monetary Mechanism for Direct Data Exchange. I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson. Direct Data Exchange in Wireless D 2D Communications. Exchange data locally instead of getting all packets from the base station. A,B. A. B. A,B.
E N D
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson
Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A,B
Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A B A,B
Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A,B A B A A B B A,B
Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A A B A B B
Direct Data Exchange in Wireless D2D Communications • Exchange data locally instead of getting all packets from the base station A A A B B B
Benefits of Wireless P2P • Exchange data locally requires less power • Reduce power consumption • Reduce interference • Increase spatial reuse and hence total system capacity • Challenge: How to provide incentives for clients to cooperate?
Network Model B B D B C D C C A A A D • Each client has all but one unique file, which it needs • The size of a file = Z bits • All clients can communicate with each other Need: D Need: C Need: B Need: A
Incentive Model B B D B C D C C A A A D • Each client has a secret valuation vi ≤1 for its needed file • Each client pays some transmission cost for the amount of upload data v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1
Incentive Model B B D B C D C C A A A D • The goal of a client: Maximize net utility vi1(receive file) - (amount of upload)/Z v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1
Bidding Model B B D B C D C C A A A D • Each client submits a bid bi to a broker • The broker determines how much data a client uploads, and what packets it should uploads v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1
An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4
An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D)
An Example B • D = (A+D)-A = (B+D)-B • Can obtain all bits of D C A b1 = 0.8 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D)
An Example B B D B C D C C A A A D b1 = 0.8 b2= 0.2 b3= 0.9 b4= 0.4 Upload0.6Z (A+B) Uploadnothing Upload0.6Z (A+D) Upload0.4Z (B+D) D B A
An Example v1 = 0.7 v2= 0.6 v3= 0.5 v4= 0.1 Upload0.6Z Uploadnothing Upload0.6Z Upload0.4Z D B A
Goal of this Work • Design a “truthful” broker policy • Truthful: Every client maximizes its utility by choosing bi = vi • The policy should also achieve high total net utility Why not simply apply VCG auction?
Comparable by treating uploads as payments, clients that download files as winners
Proposed Protocol • Every client submits a bid bi • Find the largest set S such that, for all i in S, bi≥ 1/(|S|-1) • S = {1,2,3}, b1,b2,b3≥ 1/2 • S = {1,2,3,4}, b4<1/3 • Largest set is {1,2,3} b1=0.7 b2=0.6 b3=0.6 b4=0.2
Proposed Protocol • Every client submits a bid bi • Find the largest set S such that, for all i in S, bi≥ 1/(|S|-1) • Every client in S uploads Z/(|S|-1) bits containing a linear combination of all files that other clients in S needs • Each client in S receive Z bits, and hence can obtain the file it needs • Clients not in S do not obtain needed files
Theorem: This protocol is truthful Note: The broker is only conceptual. The policy can be implemented in a distributed fashion by letting each client run the broker policy.
Performance Analysis • Sort clients such that b1≥b2≥b3≥… • The set S must be the form of {1,2,…,n} • Client i does not obtain its file only if bi<1/(i-1) Theorem: In terms of total net utility, the difference between this protocol and one maximizing total net utility is at most 1+1+1/2+1/3+…+1/(N-1), where N is the number of clients
Numerical Results • Assign vi to each client uniformly at random from [0,1] • Compare the difference in total net utility between our proposed protocol and a protocol that maximizes total net utility
Extension: Dependency Graph • Some clients may not be able to exchange file • A client may miss some files that it does not need • Some clients may be too far away to communicate • Define a “dependency graph” • Each client is a node in the graph • Two nodes have an edge between them if the two clients can exchange needed files
Solutions for Dependency Graph • Find the largest clique such that every node in the clique has bi≥ 1/(size of clique-1) • Each node in the clique uploads Z/(size of clique-1) bits • Repeat Step 1 Theorem: This protocol is truthful
Extension: Some Clients Need the Same File Need: A bi =0.5 Need: A bi =0.3 Need: A bi =0.2 • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly
Extension: Some Clients Need the Same File Need: A bi =0.5 Need: A bi =0.3 Need: A bi =0.2 • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly
Extension: Some Clients Need the Same File • Some clients need the same file • Each client has all but one files • Merge them into one, whose bid is (number of merged clients)x(minimum bid) • If they are selected in S, they divide the amount of upload evenly Need: A bi =0.6
Summary • Study the problem of direct data exchange from the perspective of game theory • While the game looks like an auction, results of auction theory do not apply • Propose a non-monetary protocol that is truthful • The protocol can be extended to various scenarios