Selfish Overlay Network Creation and Maintenance

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for the case of cooperative peers and performing game-theoretic analysis for the case of selfish peers. In this paper, we unify the aforementioned thrusts by defining and studying the selfish neighbor selection (SNS) game and its application to overlay routing. At the heart of SNS stands the restriction that peers are allowed up to a certain number of neighbors. This makes SNS substantially different from existing network formation games that impose no bounds on peer degrees. Having bounded degrees has important practical consequences as it permits the creation of overlay structures that require O(n) instead of O(n2) link monitoring overhead. We show that a node's “best response” wiring strategy amounts to solving a k -median problem on asymmetric distance. Best-response wirings have substantial practical utility as they permit selfish nodes to reap substantial performance benefits when connecting to overlays of nonselfish nodes. A more intricate consequence is that even nonselfish nodes can benefit from the existence of some selfish nodes since the latter, via their local optimizations, create a highly optimized backbone, upon which even simple heuristic wirings yield good performance. To capitalize on the above properties, we design, build, and deploy EGOIST, an SNS-inspired prototype overlay routing system for PlanetLab. We demonstrate that EGOIST outperforms existing heuristic overlays on a variety of performance metrics, including delay, available bandwidth, and node utilization, while it remains competitive with an optimal but unscalable full-mesh overlay.

[1]  Rajmohan Rajaraman,et al.  Bounded budget connection (BBC) games or how to make friends and influence people, on a budget , 2008, PODC '08.

[2]  Kimberly C. Claffy,et al.  Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links , 2005, PAM.

[3]  Ibrahim Matta,et al.  BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[4]  Kam-Wing Ng,et al.  Analyzing Multiple File Downloading in BitTorrent , 2006, 2006 International Conference on Parallel Processing (ICPP'06).

[5]  Scott Shenker,et al.  On a network creation game , 2003, PODC '03.

[6]  Rajmohan Rajaraman,et al.  Analysis of a local search heuristic for facility location problems , 2000, SODA '98.

[7]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[8]  David C. Parkes,et al.  The price of selfish behavior in bilateral network formation , 2005, PODC '05.

[9]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[10]  Mostafa H. Ammar,et al.  Preemptive Strategies to Improve Routing Performance of Native and Overlay Layers , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  William Chan,et al.  Improving Traffic Locality in BitTorrent via Biased Neighbor Selection , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[12]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[13]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[14]  Larry L. Peterson,et al.  Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.

[15]  Rajmohan Rajaraman,et al.  Reducibility among Fractional Stability Problems , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[16]  Reza Rejaie,et al.  PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Donald F. Towsley,et al.  On the interaction between overlay routing and underlay routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[18]  Joan Feigenbaum,et al.  Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.

[19]  Azer Bestavros,et al.  Distributed Network Formation for n-Way Broadcast Applications , 2010, IEEE Transactions on Parallel and Distributed Systems.

[20]  Amin Vahdat,et al.  Bullet: high bandwidth data dissemination using an overlay mesh , 2003, SOSP '03.

[21]  Dmitri Loguinov,et al.  Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[22]  Narsingh Deo,et al.  Graph Theory with Applications to Engineering and Computer Science , 1975, Networks.

[23]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[24]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[25]  Christos H. Papadimitriou,et al.  Worst-case Equilibria , 1999, STACS.

[26]  Yin Zhang,et al.  On selfish routing in Internet-like environments , 2003, IEEE/ACM Transactions on Networking.

[27]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[28]  Rajmohan Rajaraman,et al.  A bounded-degree network formation game , 2007, ArXiv.

[29]  Aaron Archer Inapproximability of the Asymmetric Facility Location and k-Median Problems , 2000 .

[30]  Reza Rejaie,et al.  PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[31]  Leandros Tassiulas,et al.  Market-Based Resource Allocation for Content Delivery in the Internet , 2003, IEEE Trans. Computers.

[32]  Jeffrey Scott Vitter,et al.  e-approximations with minimum packing constraint violation (extended abstract) , 1992, STOC '92.

[33]  Massimo Marchiori,et al.  Economic small-world behavior in weighted networks , 2003 .

[34]  Morteza Zadimoghaddam,et al.  The price of anarchy in network creation games , 2007, PODC '07.

[35]  Gustavo de Veciana,et al.  Performance of peer-to-peer networks: Service capacity and role of resource sharing policies , 2006, Perform. Evaluation.

[36]  Miguel Castro,et al.  SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.

[37]  Azer Bestavros,et al.  EGOIST: overlay routing using selfish neighbor selection , 2008, CoNEXT '08.

[38]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[39]  J. Vitter,et al.  Approximations with Minimum Packing Constraint Violation , 1992 .

[40]  Anthony Young,et al.  Overlay mesh construction using interleaved spanning trees , 2004, IEEE INFOCOM 2004.

[41]  Bhaba R. Sarker,et al.  Discrete location theory , 1991 .

[42]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[43]  Ion Stoica,et al.  Characterizing selfishly constructed overlay routing networks , 2004, IEEE INFOCOM 2004.

[44]  Sudipto Guha,et al.  A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.

[45]  Azer Bestavros,et al.  Swarming on Optimized Graphs for n-Way Broadcast , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[46]  Brighten Godfrey,et al.  Minimizing churn in distributed systems , 2006, SIGCOMM.

[47]  Srinivasan Seshan,et al.  Donnybrook: enabling large-scale, high-speed, peer-to-peer games , 2008, SIGCOMM '08.

[48]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[49]  Margo I. Seltzer,et al.  Network Coordinates in the Wild , 2007, NSDI.

[50]  Christian Scheideler,et al.  Can ISPS and P2P users cooperate for improved performance? , 2007, CCRV.

[51]  Said Salhi,et al.  Discrete Location Theory , 1991 .

[52]  Azer Bestavros,et al.  Overlay network creation and maintenance with selfish users , 2009 .

[53]  Kamesh Munagala,et al.  Local Search Heuristics for k-Median and Facility Location Problems , 2004, SIAM J. Comput..

[54]  Richard G. Baraniuk,et al.  pathChirp: Efficient available bandwidth estimation for network paths , 2003 .

[55]  Amin Vahdat,et al.  Detour: informed Internet routing and transport , 1999, IEEE Micro.

[56]  Laurent Massoulié,et al.  ECHOS: edge capacity hosting overlays of nano data centers , 2008, CCRV.

[57]  Vijay V. Vazirani,et al.  Primal-dual approximation algorithms for metric facility location and k-median problems , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[58]  Azer Bestavros,et al.  Implications of Selfish Neighbor Selection in Overlay Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[59]  N.R. Malik,et al.  Graph theory with applications to engineering and computer science , 1975, Proceedings of the IEEE.

[60]  Serge Fdida,et al.  Toward a Measurement-Based Geographic Location Service , 2004, PAM.