Reverse Engineering MAC: A Non-Cooperative Game Model Jianwei Huang - - PowerPoint PPT Presentation

reverse engineering mac a non cooperative game model
SMART_READER_LITE
LIVE PREVIEW

Reverse Engineering MAC: A Non-Cooperative Game Model Jianwei Huang - - PowerPoint PPT Presentation

Reverse Engineering MAC: A Non-Cooperative Game Model Jianwei Huang Information Engineering The Chinese University of Hong Kong Joint work with J.-W. Lee, A. Tang, M. Chiang and A. R. Canderbank J. Huang (CUHK) Reverse Engineering MAC Nov.


slide-1
SLIDE 1

Reverse Engineering MAC: A Non-Cooperative Game Model

Jianwei Huang

Information Engineering The Chinese University of Hong Kong

Joint work with J.-W. Lee, A. Tang, M. Chiang and A. R. Canderbank

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

1 / 21

slide-2
SLIDE 2

Summary

Reverse engineering: Given the solution, what is the problem? Then, know what works, what doesn’t, why it works, how to improve Provide the missing piece (on MAC) for existing layers 2-4 protocols on rigorous mathematical foundation

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

2 / 21

slide-3
SLIDE 3

Reverse Engineering

Problem

(Objective & Constraints)

Protocol

(Parameter update & Message passing) Reverse Engineering Forward Engineering

Problem

(Objective & Constraints)

Protocol

(Parameter update & Message passing) Reverse Engineering Forward Engineering

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

3 / 21

slide-4
SLIDE 4

Reverse Engineering

Problem

(Objective & Constraints)

Protocol

(Parameter update & Message passing) Reverse Engineering Forward Engineering

Problem

(Objective & Constraints)

Protocol

(Parameter update & Message passing) Reverse Engineering Forward Engineering

Related works:

◮ Layer 4: TCP/AQM [Kelly-Maulloo-Tan98, Low03,

Kunniyur-Srikant03, ...] NUM

◮ Layer 3: BGP [Griffin-Shepherd-Wilfong02] SPP ◮ Layer 2: MAC (contention avoidance in random access) [This Paper]

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

3 / 21

slide-5
SLIDE 5

TCP/AQM

Network Utility Maximization (NUM) problem

◮ Utility of each user depends on its own data rate ◮ Adequate feedback from the network

maximize

  • s Us(xs)

subject to

  • s:l∈L(s) xs ≤ cl, ∀l,

xmin x xmax.

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

4 / 21

slide-6
SLIDE 6

TCP/AQM

Network Utility Maximization (NUM) problem

◮ Utility of each user depends on its own data rate ◮ Adequate feedback from the network

maximize

  • s Us(xs)

subject to

  • s:l∈L(s) xs ≤ cl, ∀l,

xmin x xmax.

Reverse engineering provides

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

4 / 21

slide-7
SLIDE 7

TCP/AQM

Network Utility Maximization (NUM) problem

◮ Utility of each user depends on its own data rate ◮ Adequate feedback from the network

maximize

  • s Us(xs)

subject to

  • s:l∈L(s) xs ≤ cl, ∀l,

xmin x xmax.

Reverse engineering provides

◮ Better understanding: existence, uniqueness, optimality and stability,

counter-intuitive behaviors

◮ Systematic design: scalable price signal, control laws with better

stability properties

◮ Layering as optimization decomposition

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

4 / 21

slide-8
SLIDE 8

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself.

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-9
SLIDE 9

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-10
SLIDE 10

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network Reverse engineer to non-cooperative game

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-11
SLIDE 11

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network Reverse engineer to non-cooperative game Questions:

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-12
SLIDE 12

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network Reverse engineer to non-cooperative game Questions:

◮ What kind of utility functions do users have?

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-13
SLIDE 13

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network Reverse engineer to non-cooperative game Questions:

◮ What kind of utility functions do users have? ◮ What does the MAC protocol do for the game?

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-14
SLIDE 14

MAC Reverse Engineering

Utility depends on its own transmission and other links transmissions through collisions, which can not be completely controlled by the link itself. Inadequate feedback from the network Reverse engineer to non-cooperative game Questions:

◮ What kind of utility functions do users have? ◮ What does the MAC protocol do for the game? ◮ Does the Nash Equilibrium (NE) exist? If so, is the NE unique and

stable?

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

5 / 21

slide-15
SLIDE 15

Different Work

Game to MAC: MacKenzie, Wicker 2003 Jin, Kesidis 2004 Altman et. al. 2005 Yuen, Marbach 2005 Wang, Krunz, Younis 2006 This is different: Reverse engineering Discover, not impose, utility and game

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

6 / 21

slide-16
SLIDE 16

Persistence Probabilistic Model of Protocol

Protocol parameters:

◮ Politeness: pmax

l

◮ Backoff multiplier β ∈ (0, 1) ◮ pmin

l

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

7 / 21

slide-17
SLIDE 17

Persistence Probabilistic Model of Protocol

Protocol parameters:

◮ Politeness: pmax

l

◮ Backoff multiplier β ∈ (0, 1) ◮ pmin

l

Protocol description: link l transmits with a probability pl

◮ If success, set pl = pmax

l

for the next transmission

◮ If failure, set pl = max{pmin

l

, βlpl}, where 0 < βl < 1

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

7 / 21

slide-18
SLIDE 18

Persistence Probabilistic Model of Protocol

Protocol parameters:

◮ Politeness: pmax

l

◮ Backoff multiplier β ∈ (0, 1) ◮ pmin

l

Protocol description: link l transmits with a probability pl

◮ If success, set pl = pmax

l

for the next transmission

◮ If failure, set pl = max{pmin

l

, βlpl}, where 0 < βl < 1

Define Lto(l) as set of links causing interferences to link l

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

7 / 21

slide-19
SLIDE 19

Persistence Probability Update

pl(t + 1) = max{pmin

l

, pmax

l

1{Tl(t)=1}1{Cl(t)=0} +βlpl(t)1{Tl(t)=1}1{Cl(t)=1} +pl(t)1{Tl(t)=0}} 1a: indicator function of event a Tl(t): event that link l transmits at time slot t Prob{Tl(t) = 1|p(t)} = pl(t) Cl(t): event that there is a collision to link l′s transmission at time slot t Prob{Cl(t) = 1|p(t)} = 1 −

  • n∈Lto(l)

(1 − pn(t))

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

8 / 21

slide-20
SLIDE 20

MAC Game

A deterministic updating rule approximating the average behavior pl(t + 1) = max{pmin

l

, pmax

l

pl(t)

  • n∈Lto(l)

(1 − pn(t)) +βlpl(t)pl(t)  1 −

  • n∈Lto(l)

(1 − pn(t))   +pl(t)(1 − pl(t))}, The strategy such that each link tries to maximize its utility Ul based

  • n strategies of other links
  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

9 / 21

slide-21
SLIDE 21

MAC Game

A deterministic updating rule approximating the average behavior pl(t + 1) = max{pmin

l

, pmax

l

pl(t)

  • n∈Lto(l)

(1 − pn(t)) +βlpl(t)pl(t)  1 −

  • n∈Lto(l)

(1 − pn(t))   +pl(t)(1 − pl(t))}, The strategy such that each link tries to maximize its utility Ul based

  • n strategies of other links

Define MAC game as [E, ×l∈EAl, {Ul}l∈E]

◮ E: set of players (links) ◮ Al = {pl|pmin

l

≤ pl ≤ pmax

l

}: action set of link l

◮ Ul: utility function of link l

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

9 / 21

slide-22
SLIDE 22

MAC Game

We know

◮ S(p) = pl

  • n∈Lto(l)(1 − pn): probability of transmission success

◮ F(p) = pl(1 −

n∈Lto(l)(1 − pn)): probability of transmission failure

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

10 / 21

slide-23
SLIDE 23

MAC Game

We know

◮ S(p) = pl

  • n∈Lto(l)(1 − pn): probability of transmission success

◮ F(p) = pl(1 −

n∈Lto(l)(1 − pn)): probability of transmission failure

Theorem: Utility function turns out to be expected net reward: Ul(p) = R(pl)S(p) − C(pl)F(p) where

◮ R(pl) = pl( 1

2pmax l

− 1

3pl): reward for transmission success

◮ C(pl) = 1

3(1 − βl)p2 l : cost for transmission failure

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

10 / 21

slide-24
SLIDE 24

0.1 0.2 0.3 0.4 0.5 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 x 10

−3

pl U(p) pl* = 0.333

Dependence of a utility function on its own persistence probability (βl = 0.5, pmax

l

= 0.5, and

n∈Lto(l)(1 − pn) = 0.5)

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

11 / 21

slide-25
SLIDE 25

MAC protocol as a stochastic subgradient algorithm

Is it a gradient-based maximization of Ul(p) over pl?

◮ No, that requires explicit message passing among links

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

12 / 21

slide-26
SLIDE 26

MAC protocol as a stochastic subgradient algorithm

Is it a gradient-based maximization of Ul(p) over pl?

◮ No, that requires explicit message passing among links

MAC maximizes Ul using stochastic subgradient ascent method (using only local information on success and collision): pl(t + 1) = max{pmin

l

, pl(t) + vl(t)} where E{vl(t)|p(t)} = ∂Ul(p) ∂pl |p=p(t)

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

12 / 21

slide-27
SLIDE 27

Existence of Nash Equilibrium

Theorem: there always exits a Nash equilibrium in the MAC game, which can be characterized by p∗

l =

pmax

l

  • n∈Lto(l)(1 − p∗

n)

1 − βl(1 −

n∈Lto(l)(1 − p∗ n)), ∀l

◮ Proof: Fixed point theorem in the compact strategy interval.

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

13 / 21

slide-28
SLIDE 28

Uniqueness of Nash Equilibrium

The Nash equilibrium may not be unique in general. Example

◮ Two links interfering with each other ◮ pmax

1

= pmax

2

= pmax = 1

◮ Infinite many Nash equilibria

max{pmin, 1 − pmax 1 − βpmax } ≤ p∗

1 ≤ min{1, 1 − pmin

1 − βpmin } p∗

2 = 1 − p∗ 1

1 − βp∗

1

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

14 / 21

slide-29
SLIDE 29

Uniqueness and Convergence of Nash Equilibrium

Define the best response function as p∗

l (t + 1) = arg

max

pmin

l

≤pl≤pmax

l

Ul(pl, p∗

−l(t))

Theorem: connsider best response updates with p∗(0) = pmin, then,

◮ p∗(2t + 1) → p′ and p∗(2t) → p′′ as t → ∞. ◮ If p′ = p′′, then p′ is a Nash equilibrium.

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

15 / 21

slide-30
SLIDE 30

Uniqueness and Convergence of Nash Equilibrium

Define the best response function as p∗

l (t + 1) = arg

max

pmin

l

≤pl≤pmax

l

Ul(pl, p∗

−l(t))

Theorem: connsider best response updates with p∗(0) = pmin, then,

◮ p∗(2t + 1) → p′ and p∗(2t) → p′′ as t → ∞. ◮ If p′ = p′′, then p′ is a Nash equilibrium. ◮ Proof: S-modular theory.

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

15 / 21

slide-31
SLIDE 31

Uniqueness and Convergence of Nash Equilibrium

Assume all links have the same pmax < 1 and pmin = 0 Theorem: define K = maxl |Lto(l)|, then if pmaxK 4β(1 − pmax) < 1

◮ The Nash equilibrium is unique ◮ The best response iteration globally converges to the unique

equilibrium

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

16 / 21

slide-32
SLIDE 32

Uniqueness and Convergence of Nash Equilibrium

Assume all links have the same pmax < 1 and pmin = 0 Theorem: define K = maxl |Lto(l)|, then if pmaxK 4β(1 − pmax) < 1

◮ The Nash equilibrium is unique ◮ The best response iteration globally converges to the unique

equilibrium

◮ Proof: Properly bounding the matrix norm of the Jacobian. Show it is

a contraction mapping.

How polite is necessary? Critical value: pmax

c

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

16 / 21

slide-33
SLIDE 33

Uniqueness and Convergence of Nash Equilibrium

All links interfere with each other

0.2 0.4 0.6 0.8 1 2 4 6 8 10 0.2 0.4 0.6 0.8 β L pmax

c

(β, L)

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

17 / 21

slide-34
SLIDE 34

Network Topology

3 4 A B C D E G 1 2 F I H 5 6 d d d d d d

A network with Six Links

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

18 / 21

slide-35
SLIDE 35

Convergence

20 40 60 80 100 0.1 0.2 0.3 0.4 0.5 time pl Best response Gradient Stochastic subgradient

pmax

l

= 0.5

20 40 60 80 100 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 time pl Best response Gradient Stochastic subgradient

pmax

l

= 0.8 Comparison of trajectories of pl(t) in the network

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

19 / 21

slide-36
SLIDE 36

Fairness

0.05 0.1 0.15 0.2 0.2 0.3 0.4 0.5 0.6 a pl

*

link 1 link 2

β1 = β2 = 0.5 pmax

1

= 0.5, pmax

2

= 0.5 + a

0.05 0.1 0.15 0.2 0.36 0.37 0.38 0.39 0.4 0.41 0.42 0.43 a pl link 1 link 2

pmax

1

= pmax

2

= 0.5 β1 = 0.5, β2 = 0.5 + a

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

20 / 21

slide-37
SLIDE 37

Conclusions

Reverse engineering for MAC protocol

◮ Reverse engineered as a non-cooperative game ◮ Utility function discovered: expected net reward ◮ NE always exists. It is unique and stable if the protocol is polite

enough and backoff smooth enough.

◮ Sequential subgradient = Best response

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

21 / 21

slide-38
SLIDE 38

Conclusions

Reverse engineering for MAC protocol

◮ Reverse engineered as a non-cooperative game ◮ Utility function discovered: expected net reward ◮ NE always exists. It is unique and stable if the protocol is polite

enough and backoff smooth enough.

◮ Sequential subgradient = Best response

Future work

◮ Bounding efficiency loss, Gradient play convergence ◮ From reverse engineering to forward engineering (design) ◮ Union of session level stochastic and utility-optimal protocol

  • J. Huang (CUHK)

Reverse Engineering MAC

  • Nov. 2007

21 / 21