Selfish Distributed Compression Over Networks: Correlation Induces Anarchy

We consider the min-cost multicast problem (under network coding) with multiple correlated sources where each terminal wants to losslessly reconstruct all the sources. We study the inefficiency brought forth by the selfish behavior of the terminals in this scenario by modeling it as a noncooperative game among the terminals. The degradation in performance due to the lack of regulation is measured by the Price of Anarchy (POA), which is defined as the ratio between the cost of the worst possible Wardrop equilibrium and the socially optimum cost. Our main result is that in contrast with the case of independent sources, the presence of source correlations can significantly increase the price of anarchy. Toward establishing this result, we first characterize the socially optimal flow and rate allocation in terms of four intuitive conditions. Next, we show that the Wardrop equilibrium is a socially optimal solution for a different set of (related) cost functions. Using this, we construct explicit examples that demonstrate that the POA >; 1 and determine near-tight upper bounds on the POA as well. The main techniques in our analysis are Lagrangian duality theory and the usage of the supermodularity of conditional entropy.

[1]  Zongpeng Li,et al.  Cross-Monotonic Multicast , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[2]  Zhu Han,et al.  Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[3]  Vinod M. Prabhakaran,et al.  Rate region of the quadratic Gaussian CEO problem , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[4]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[5]  H. Vincent Poor,et al.  Energy efficiency in multi-hop CDMA networks: a game theoretic analysis , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).

[6]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[7]  H. Vincent Poor,et al.  Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis , 2006, ICPADS.

[8]  R. Koetter,et al.  Network Coding for Correlated Sources , 2004 .

[9]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[10]  Te Sun Han,et al.  Slepian-Wolf-Cover Theorem for Networks of Channels , 1980, Inf. Control..

[11]  João Barros,et al.  Network information flow with correlated sources , 2006, IEEE Transactions on Information Theory.

[12]  Tim Roughgarden,et al.  Selfish routing and the price of anarchy , 2005 .

[13]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[14]  Christos H. Papadimitriou,et al.  Algorithms, Games, and the Internet , 2001, ICALP.

[15]  Sanjay Shakkottai,et al.  Min-Cost Selfish Multicast With Network Coding , 2006, IEEE Transactions on Information Theory.

[16]  Baltasar Beferull-Lozano,et al.  Networked Slepian-Wolf: theory, algorithms, and scaling laws , 2005, IEEE Transactions on Information Theory.

[17]  T. Koopmans,et al.  Studies in the Economics of Transportation. , 1956 .

[18]  Fang Zhao,et al.  Minimum-cost multicast over coded packet networks , 2005, IEEE Transactions on Information Theory.

[19]  Toby Berger,et al.  Multiterminal Source Coding with High Resolution , 1999, IEEE Trans. Inf. Theory.

[20]  Zongpeng Li,et al.  Min-Cost Multicast of Selfish Information Flows , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[21]  Chang Wen Chen,et al.  Correlated data gathering in wireless sensor networks based on distributed source coding , 2008, Int. J. Sens. Networks.

[22]  Aditya Ramamoorthy,et al.  Rate and power allocation under the pairwise distributed source coding constraint , 2008, IEEE Transactions on Communications.

[23]  Christos H. Papadimitriou,et al.  Worst-case Equilibria , 1999, STACS.

[24]  Piyush Gupta,et al.  A system and traffic dependent adaptive routing algorithm for ad hoc networks , 1997, Proceedings of the 36th IEEE Conference on Decision and Control.

[25]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[26]  Stella C. Dafermos,et al.  Traffic assignment problem for a general network , 1969 .

[27]  Aditya Ramamoorthy,et al.  Minimum Cost Distributed Source Coding Over a Network , 2007, IEEE Transactions on Information Theory.

[28]  Muriel Médard,et al.  Minimum Cost Mirror Sites Using Network Coding: Replication versus Coding at the Source Nodes , 2009, IEEE Transactions on Information Theory.

[29]  P. Gács,et al.  Algorithms , 1992 .

[30]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[31]  Zongpeng Li,et al.  Efficient and distributed computation of maximum multicast rates , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[32]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[33]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[34]  Aditya Ramamoorthy,et al.  Networked Distributed Source Coding , 2011, Theoretical Aspects of Distributed Computing in Sensor Networks.

[35]  J. G. Pierce,et al.  Geometric Algorithms and Combinatorial Optimization , 2016 .