Traffic Offloading and Wireless Edge Networks: Theory and Novel - - PowerPoint PPT Presentation

traffic offloading and wireless edge networks theory and
SMART_READER_LITE
LIVE PREVIEW

Traffic Offloading and Wireless Edge Networks: Theory and Novel - - PowerPoint PPT Presentation

Traffic Offloading and Wireless Edge Networks: Theory and Novel Realizations Leandros Tassiulas Yale University WiOpt, Paris, May 2017. A New Era in Wireless Networking Recent developments: Mobile data traffic growth, new services


slide-1
SLIDE 1

Traffic Offloading and Wireless Edge Networks: Theory and Novel Realizations

Leandros Tassiulas Yale University WiOpt, Paris, May 2017.

slide-2
SLIDE 2

A New Era in Wireless Networking

  • Recent developments:
  • Mobile data traffic growth, new services & advanced devices, 5G vision.
  • Challenges for cellular networks:
  • Accommodate the growing traffic.
  • Support emerging 5G services.
  • Traditional network expansion methods:
  • Upgrading technology, acquiring new spectrum, deploying more cells, ...

... are costly and time-consuming solutions.

  • Our approach:
  • Explore methods that aim to fully utilize (i) existing spectrum allocations and

(ii) idle user-owned wireless infrastructure.

slide-3
SLIDE 3

Outline

  • Mobile data offloading.
  • Use Wi-Fi capacity to serve cellular traffic.
  • User Provided Networks (UPNs).
  • Facilitate multi hop wireless access through exchange of wireless resources.
  • Prototype realization based on mobile SDN.
  • Resource exchange markets in networks.
  • An Arrow-Debreu type formulation for networks.
slide-4
SLIDE 4

Mobile Data Offloading

Offloading can be realized over femtocells or Wi-Fi access points.

  • Goal: reduce network costs (OpEx) & accommodate more traffic.
  • The wireless spectrum or the wired link are not owned by the operator.
slide-5
SLIDE 5

Potential and Key Question

  • Mobile network operators have adopted such solutions:
  • AT&T had deployed 32,000 Wi-Fi hotspots by 2012.
  • T-Mobile and other operators, collaborate with FON.
  • Republic Wireless, Google Fi, etc.
  • Offloading benefits depend on the availability of APs’.
  • How to increase this availability?
  • Our proposal for operators: lease idle user-owned Wi-Fi APs.
  • Residential Wi-Fi APs are often underutilized.
  • On-demand & low-cost network capacity expansion.
  • Fully aligned with 5G design principles.
slide-6
SLIDE 6

Mobile Data Offloading Markets

  • Related Publications:
  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, An Iterative Double Auction for

Mobile Data Offloading, IEEE WiOpt, 2013, (Best paper Award), IEEE/ACM

  • Trans. on Networking, 23(5), 2015.
  • K. Poularakis, G. Iosifidis, L. Tassiulas, Deploying Carrier-grade WiFi:

Offload Traffic, Not Money, ACM Mobihoc, 2016.

  • L. Gao, G. Iosifidis, J. Huang, L. Tassiulas, D. Li, Bargaining-Based Mobile

Data Offloading, IEEE JSAC, SI on 5G, 32(6), 2014.

  • A. Apostolaras, G. Iosifidis, K. Chounos, T. Korakis, L. Tassiulas, A

Mechanism for Mobile Data Offloading to Wireless Mesh Networks, IEEE

  • Trans. on Wireless Comm., 15(9), 2016.
  • K. Poularakis, G. Iosifidis, I. Pefkianakis, L. Tassiulas, Mobile Data

Offloading through Caching in Residential 802.11 Wireless Networks, IEEE

  • Trans. on Network Services & Management, 13(1), 2016.
slide-7
SLIDE 7

Data Offloading Marketplace

  • A set of network operators:
  • Each operator owns many base stations.
  • Each BS had different load.
  • A set of access points:
  • Each AP has different Internet capacity.
  • AP owners have communication needs.
  • A Broker
  • Goal & Key questions:
  • Efficiency: maximize BSs’ benefits, minimize APs’ costs.
  • How much traffic from each BS should be offloaded to each AP?
  • How much each AP owner should be reimbursed for serving this traffic?
  • Technical Issues:
  • Offloading Benefits are AP-specific and interdependent.
  • Offloading Capacities of the APs are coupled.
slide-8
SLIDE 8

Data Offloading Marketplace

  • A set of network operators:
  • Each operator owns many base stations.
  • Each BS serves different amount of traffic.
  • A set of access points:
  • Each AP has different Internet capacity.
  • AP owners have communication needs.
  • A Broker
  • Economic Issues:
  • Multiple buyers & multiple sellers with conflicting goals.
  • Information asymmetry about the needs.
  • Solution approach:
  • Use an auction to elicit hidden information.
  • Traditional auctions, e.g., VCG and McAfee, cannot be used.
  • Design a new auction algorithm.
  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, A Double Auction Mechanism for Mobile Data

Offloading Markets, IEEE/ACM Trans. on Networking, vol. 23, no. 5, 2015.

slide-9
SLIDE 9

Data Offloading Marketplace

  • A set of network operators:
  • Each operator owns many base stations.
  • Each BS serves different amount of traffic.
  • A set of access points:
  • Each AP has different Internet capacity.
  • AP owners have communication needs.
  • A Broker
  • Economic Issues:
  • Multiple buyers & multiple sellers with conflicting goals.
  • Information asymmetry about the needs.
  • Solution approach:
  • Use an auction to elicit hidden information.
  • Traditional auctions, e.g., VCG and McAfee, cannot be used.
  • Design a new auction algorithm.
  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, A Double Auction Mechanism for Mobile Data

Offloading Markets, IEEE/ACM Trans. on Networking, vol. 23, no. 5, 2015.

slide-10
SLIDE 10

Data Offloading Marketplace

  • A set of network operators:
  • Each operator owns many base stations.
  • Each BS serves different amount of traffic.
  • A set of access points:
  • Each AP has different Internet capacity.
  • AP owners have communication needs.
  • A Broker
  • Economic Issues:
  • Multiple buyers & multiple sellers with conflicting goals.
  • Information asymmetry about the needs.
  • Solution approach:
  • Use an auction to elicit hidden information.
  • Traditional auctions, e.g., VCG and McAfee, cannot be used.
  • Design a new auction algorithm.
  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, A Double Auction Mechanism for Mobile Data

Offloading Markets, IEEE/ACM Trans. on Networking, vol. 23, no. 5, 2015.

slide-11
SLIDE 11

Model

  • A market of multiple BSs and multiple APs, studied for a period T:
  • M, {1, ..., M}: the set of BSs; I, {1, ..., I}: the set of involved APs.
  • Base station m:
  • xm, {xm1, ..., xmI}: offload request vector.
  • Jm(xm): offloading benefit.
  • Access Point i:
  • Ci: Internet access capacity.
  • yi, {yi1, ..., yiM}: offload admission vector.
  • Vi(yi): offloading cost.
  • Broker’s objective: Efficiency Maximization

maximize

xm,yi ,8m,8i

X

m2M

Jm(xm) X

i2I

Vi(yi) Efficiency

subject to (i)

P

m2M yim  Ci, 8i 2 I,

Capacity constraint

(iii) xmi = yim, 8m 2 M, i 2 I.

Feasibility

slide-12
SLIDE 12

Iterative Double Auction – IDA

  • An auction mechanism includes:
  • An allocation rule & a pricing rule.
  • Bidders’ Bidding Problems
  • BS Bids: pm = (pmi : i = 1, . . . , I) .

Pm : maximize

pmi 0,8i

Jm(xm(pm)) hm(pm), for every BS m;

  • AP Bids: αi = (αim : m = 1, . . . , M) .

Pi : maximize

αim0,8m

Vi(yi(αi)) + li(αi), for every AP i.

  • Broker’s Allocation Problem

maximize

xm,yi ,8m,8i

X

m2M

X

i2I

⇣ pmi log xmi αim 2 y 2

im

subject to (i)

P

m2M yim  Ci, 8i 2 I, (ii) xmi = yim, 8m 2 M, i 2 I.

slide-13
SLIDE 13

Iterative Double Auction – IDA

  • The KKT conditions for the efficiency maximization problem:

(A1) : ∂Jm(x

m)

∂xmi = µ

mi, (A2) : ∂Vi(y i )

∂yim = µ

mi λ i ,

(A3) : λ

i ·

M

X

m=1

y

im Ci

⌘ = 0, (A4) : x

mi = y im,

(A5) : µ

mi · (y im x mi) = 0, (A6) : x mi, y im, λ i 0.

  • The KKT conditions for the broker problem:

(B1) : x⇤

mi = pmi

µ⇤

mi

, (B2) : y ⇤

im = µ⇤ mi λ⇤ i

αim , (B3) (B6) = (A3) (A6)

  • If APs and BSs submit:

pmi = x⇤

mi · ∂Jm(x⇤ m)

∂xmi , αim = 1 y ⇤

im

· ∂Vi(y⇤

i )

∂yim ... the solutions coincide.

slide-14
SLIDE 14

Iterative Double Auction – IDA

  • The KKT conditions for the efficiency maximization problem:

(A1) : ∂Jm(x

m)

∂xmi = µ

mi, (A2) : ∂Vi(y i )

∂yim = µ

mi λ i ,

(A3) : λ

i ·

M

X

m=1

y

im Ci

⌘ = 0, (A4) : x

mi = y im,

(A5) : µ

mi · (y im x mi) = 0, (A6) : x mi, y im, λ i 0.

  • The KKT conditions for the broker problem:

(B1) : x⇤

mi = pmi

µ⇤

mi

, (B2) : y ⇤

im = µ⇤ mi λ⇤ i

αim , (B3) (B6) = (A3) (A6)

  • If APs and BSs submit:

pmi = x⇤

mi · ∂Jm(x⇤ m)

∂xmi , αim = 1 y ⇤

im

· ∂Vi(y⇤

i )

∂yim ... the solutions coincide.

slide-15
SLIDE 15

Iterative Double Auction – IDA

  • The payment and reimbursement rules we employ are:

hm(pm) =

I

X

i=1

pmi, m = 1, . . . , M li(αi) =

M

X

m=1

yim(λi µmi), i = 1, . . . , I

− −

20 40 60 80 100 120 −1.2 −1 −0.8 −0.6 −0.4 −0.2 0.2 0.4

Gap y − x Step − t

BS 1, AP 1: y11 −x11 BS 1, AP 2: y21−x12 BS 2, AP 1: y12−x21 BS 2, AP 2: y22−x22

slide-16
SLIDE 16

Iterative Double Auction – IDA

BS2 AP1 BS1 AP2 AP3

BROKER

Broker announces pricing signals (Lagrange Multipliers) 1

1 The broker announces the pricing signals

λi, µmi, i 2 I, m 2 M.

slide-17
SLIDE 17

Iterative Double Auction – IDA

BS2 AP1 BS1 AP2 AP3

BROKER

Each AP find its currently optimal bid vector 2 Each BS finds its currently optimal bid vector 2

1 The broker announces the pricing signals

λi, µmi, i 2 I, m 2 M.

2 Each AP i and BS m updates its bids

using the new Lagrange multipliers.

slide-18
SLIDE 18

Iterative Double Auction – IDA

BS2 AP1 BS1 AP2 AP3

BROKER

Each BS sends its bids to the broker 3 Each AP sends its bids to the broker 3

1 The broker announces the pricing signals

λi, µmi, i 2 I, m 2 M.

2 Each AP i and BS m updates its bids

using the new Lagrange multipliers.

3 APs and BSs send their bids to the

broker.

slide-19
SLIDE 19

Iterative Double Auction – IDA

BS AP1 BS AP2 AP3

BROKER

The Broker updates the Lagrange Multipliers 4

1 The broker announces the pricing signals

λi, µmi, i 2 I, m 2 M.

2 Each AP i and BS m updates its bids

using the new Lagrange multipliers.

3 APs and BSs send their bids to the

broker.

4 The broker updates the pricing signals λi,

µmi, i 2 I, m 2 M, using a gradient update.

slide-20
SLIDE 20

Iterative Double Auction – IDA

BS AP1 BS AP2 AP3

BROKER

The Broker updates the Lagrange Multipliers 4

1 The broker announces the pricing signals

λi, µmi, i 2 I, m 2 M.

2 Each AP i and BS m updates its bids

using the new Lagrange multipliers.

3 APs and BSs send their bids to the

broker.

4 The broker updates the pricing signals λi,

i 2 I, µm, m 2 M, using a gradient update method.

5 The above steps are executed iteratively

until convergence: demands match

  • fferings.
slide-21
SLIDE 21

Summary

  • A mobile data offloading market for leasing idle capacity.
  • A new auction algorithm that achieves the optimal solution.
  • No need to know offloading needs and cost functions.
  • Can use a detailed network modeling approach.
  • Other market models are also important to explore.
  • Example: MNO reimburses its subscribers to open their APs.
  • Caching-at-the-edge solutions employing user-owned APs.
  • Intel’s 2011 experiments showed 40% reduction in backhaul traffic.
  • L. Gao, G. Iosifidis, J. Huang, L. Tassiulas, D. Li, Bargaining-based Mobile Data Offloading,

IEEE JSAC, SI on 5G, 32(6), 2014.

  • K. Poularakis, G. Iosifidis, et al, Mobile Data Offloading through Caching in Residential 802.11

Wireless Networks, IEEE Trans. on Network Services & Management, 2016.

slide-22
SLIDE 22

User Provided Networks (UPNs)

  • Related publications:
  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, Enabling Crowdsourced Mobile Internet

Access, IEEE Infocom, 2014, cond. accepted in IEEE/ACM ToN 2016.

  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, Incentive Mechanisms for User-provided

Networks, IEEE Communications Magazine, 52 (9), Sep., 2014.

  • L. Gao, G. Iosifidis, J. Huang, L. Tassiulas, Hybrid Data Pricing for Network-Assisted

User-Provided Connectivity, IEEE Infocom, 2014.

  • D. Syrivelis, G. Iosifidis, D. Delimbasis, K. Chounos, T. Korakis, L. Tassiulas, Bits and

Coins: Supporting Collaborative Consumption of Mobile Internet, IEEE Infocom, 2015.

  • D. Giatsios, G. Iosifidis, and L. Tassiulas, Mobile edge-Networking Architectures and

Control Policies for 5G Communication Systems, WiOpt, 2016.

slide-23
SLIDE 23

User Provided Networks

WiFi/Bluetooth Malfunctioned Congested WiFi Cell High-Performance WiFi/Bluetooth Cell

  • Indicative Applications:
  • Provide infrastructure connectivity to devices with no access.
  • Overcome poor coverage through smart relaying.
  • Support throughput-hungry services.
  • Alleviate congestion problems or temporal malfunctions of the infrastructure.
  • Innovative startups have already presented such solutions.
  • Question: Can we find an optimal operation policy?
  • How to aggregate and share the users’ network resources in an efficient and

fair fashion, such that users have enough incentives to participate?

  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, Enabling Crowdsourced Mobile Internet Access,

IEEE Infocom, 2014, cond. accepted in IEEE/ACM ToN.

slide-24
SLIDE 24

User Provided Networks

WiFi/Bluetooth Malfunctioned Congested WiFi Cell High-Performance WiFi/Bluetooth Cell

  • Indicative Applications:
  • Provide infrastructure connectivity to devices with no access.
  • Overcome poor coverage through smart relaying.
  • Support throughput-hungry services.
  • Alleviate congestion problems or temporal malfunctions of the infrastructure.
  • Innovative startups have already presented such solutions.
  • Question: Can we find an optimal operation policy?
  • How to aggregate and share the users’ network resources in an efficient and

fair fashion, such that users have enough incentives to participate?

  • G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, Enabling Crowdsourced Mobile Internet Access,

IEEE Infocom, 2014, cond. accepted in IEEE/ACM ToN.

slide-25
SLIDE 25

Proposed Solution

  • A mechanism based on the Nash bargraining solution + virtual currency.
  • Users are modeled through payoff functions.
  • Utility from consuming data, energy cost and monetary cost for serving data,

virtual currency benefits.

  • Efficiency and Fairness are addressed by the Nash Bargaining Solution.
  • Pareto optimal.
  • Takes into account the standalone operation of each node.
  • Self-enforcing, hence users agree to apply the policy.
  • Virtual Currency solves the double coincidence of needs and wants

problem.

  • Decentralized implementation is possible if necessary.
  • Dual decomposition of a convex optimization problem (the NBS problem).
slide-26
SLIDE 26

Model

  • A directed network G = (N, E) that we study for a period T.
  • In(i): parent nodes of i, Out(i): child nodes of i.
  • Each node n ∈ N can initiate a data session (n).
  • Cij: capacity of (i, j) ∈ E , C0i: Internet capacity of i ∈ N.
  • x(n)

ij

: bytes transferred over link (i, j), for commodity (n).

  • y(n)

i

: bytes downloaded by node i, for commodity (n).

  • Ui(ri): utility function modeling his communication needs, where

ri = y(i)

i

+ X

j2In(i)

x(i)

ji

  • Vi(ei): energy consumption aversion function, where ei is the total

consumed energy in T: ei = X

j2Out(i)

es

ij

X

n2N

x(n)

ij

+ X

j2In(i)

er

ji

X

n2N

x(n)

ji

+ e0i X

n2N

y(n)

i

.

  • pi ≥ 0: Internet access cost per byte.
  • The overall payoff Ji(·) is defined as:

Ji(x, y) = Ui(ri) − Vi(ei) − pi X

n2N

y(n)

i

slide-27
SLIDE 27

Problem Formulation

  • Standalone performance: no relaying to/from others.

max

y(i)

i

C0i

Ji(y (i)

i )

Benchmark (minimum) performance Js

i = Ji(y ⇤ (i) i

).

  • Virtual Coins system:
  • Di: the initial coin budget of each user i ∈ N.
  • Hi(·): the coins valuation function of user i (linear).
  • z(n)

ij

: coins paid by j to i, for commodity (n), with (i, j) ∈ E.

  • Each user receives γ > 0 coins for his participation in each round.
  • Total budget of K coins in the system (upper bound).
  • The payoff of each user includes now the coin budget:

JG

i (x, y, z) = Ji(x, y) + Hi(z, Di + γ)

slide-28
SLIDE 28

Bargaining Problem

  • The bargaining equilibrium can be derived by the solution of the

following convex problem. max

x,y,z

X

i2N

log

  • JG

i (x, x, y) Js i Hi(z, Di)

  • s.t.

X

j2In(i)

x(n)

ji

+ y (n)

i

= X

j2Out(i)

x(n)

ij , 8 i, n 2 N, i 6= n,

(1) X

n2N

x(n)

ij

 Cij, 8 (i, j) 2 E, X

n2N

y (n)

i

 C0i, 8 i 2 N (2) X

n2N

X

j2In(i)

z(n)

ji

  • X

n2N

X

j2Out(i)

z(n)

ij

 Di + γ, 8i 2 N (3) JG

i (x, x, y) Js i + Hi(z, Di), 8 i 2 N

(4) x(n)

ij

0, y (n)

i

0, 0  z(n)

ij

 K, 8 i, j, n 2 N (5)

  • where eq. (4) ensures that each user will receive a payoff at least equal

to his standalone performance.

slide-29
SLIDE 29

User Provided Networks

  • Question: Can we implement such systems in practice?
  • Requirements:
  • Independent of the physical layer.
  • Highly adaptive to changing network conditions and users’ needs.
slide-30
SLIDE 30

User Provided Networks

  • Question: Can we implement such systems in practice?
  • Requirements:
  • Independent of the physical layer.
  • Highly adaptive to changing network conditions and users’ needs.
slide-31
SLIDE 31

CoNeS: Collaborative Network Sharing System

  • Basic components:
  • SDN-enhanced mobile devices: implement a programmable packet

forwarding datapath.

  • Cloud service: monitors the nodes, and devises the policy.
  • D. Syrivelis, G. Iosifidis, D. Delimpasis, K. Chounos, T. Korakis, L. Tassiulas, Bits & Coins:

Supporting Collaborative Consumption of Mobile Internet, IEEE Infocom, 2015.

slide-32
SLIDE 32

CoNeS: Collaborative Network Sharing System

Internet

ISCD Service CDE SMDP Service Network Data Collection Decision Graph Derivation 3G/4G WiFi D2D links D2D data exchange Downloading / Uploading Data Statistics, Demands, Resources, Discovery Decision Graph

Gateway Relay/Client Client

Device Characteristics · Internet access capacity · Internet access cost · D2D links capacity · Battery energy Decision Graph D2D links Statistics & Demands SDN Control Plane SDN Data Path

Client Client

MBaaS Platform

2 1 1

  • 1: Every node executes neighbor discovery.
  • 2: Forwards to the cloud the network information (D2D links capacity), its

resource availability (battery, Internet throughput), and its demand.

slide-33
SLIDE 33

CoNeS: Collaborative Network Sharing System

Internet

ISCD Service CDE SMDP Service Network Data Collection Decision Graph Derivation 3G/4G WiFi D2D links D2D data exchange Downloading / Uploading Data Statistics, Demands, Resources, Discovery Decision Graph

Gateway Relay/Client Client

Device Characteristics · Internet access capacity · Internet access cost · D2D links capacity · Battery energy Decision Graph D2D links Statistics & Demands SDN Control Plane SDN Data Path

Client Client

MBaaS Platform

3 3 4 4

  • 3: The CDE collects the information; derives the servicing policy.
  • 4: The decision graph is communicated to the nodes of the swarm.

Steps 1 - 4 are executed periodically.

slide-34
SLIDE 34

CoNeS: Collaborative Network Sharing System

Internet

ISCD Service CDE SMDP Service Network Data Collection Decision Graph Derivation 3G/4G WiFi D2D links D2D data exchange Downloading / Uploading Data Statistics, Demands, Resources, Discovery Decision Graph

Gateway Relay/Client Client

Device Characteristics · Internet access capacity · Internet access cost · D2D links capacity · Battery energy Decision Graph D2D links Statistics & Demands SDN Control Plane SDN Data Path

Client Client

MBaaS Platform

3 3 4 4

  • 3: The CDE collects the information; derives the servicing policy.
  • 4: The decision graph is communicated to the nodes of the swarm.

Steps 1 - 4 are executed periodically.

slide-35
SLIDE 35

Inside the Node

  • OVS - Switch

HTB1 Queues

Port 1

Bluetooth Phy HTB2 Queues

Port 2

WiFi Phy HTBN Queues

Port N

LTE Phy

Local Port Virtual Ethernet Local IP Stack Mobile Node SMD (Linux Kernel) ICSD cfs dcs VPN Default Internet Gateway Tunnel OpenFlow API

  • Open vSwitch datapath:
  • Remotely configured, controls all network interfaces.
  • Internet Connection Sharing Daemon (ICSD):
  • Runs a discovery protocol & reports to CDE; gets & applies updates.
slide-36
SLIDE 36

Performance Evaluation

  • How often should the devices send status to the cloud?
  • How fast is it possible to reconfigure the network?
  • How much is the delay, bandwidth and energy consumption overhead?
slide-37
SLIDE 37

Performance Evaluation

  • How often should the devices send status to the cloud?
  • How fast is it possible to reconfigure the network?
  • How much is the delay, bandwidth and energy consumption overhead?
slide-38
SLIDE 38

Performance Evaluation

  • How often should the devices send status to the cloud?
  • How fast is it possible to reconfigure the network?
  • How much is the delay, bandwidth and energy consumption overhead?
slide-39
SLIDE 39

Experimental Setup

  • Embedded Nodes (single-board computers):
  • Intel Atom CPU, 1Gbyte RAM,
  • 802.11n WiFi (ad hoc mode), 100Mbit cable Ethernet interface.
  • Real-time power consumption measurement.
  • The cloud service is deployed at the NITOS cluster.
slide-40
SLIDE 40

Experiments Findings

  • 1

2 3 Internet Internet Gateway Gateway Client (1) (2)

  • Status updates:
  • 3 sec is optimal, 2.5% energy consumption, no additional delay. More

frequent updates double energy consumption.

  • SDN Overheads:
  • No important energy consumption or computation overheads (2%).
  • Network reconfiguration:
  • Gateway switching every 20 sec increases delay 24%, and energy

consumption 15%

slide-41
SLIDE 41

Service & Resource Exchange over Networks

  • Basic features of the system:
  • Each node has some amount of spare resource.
  • Nodes are complementary in terms of resource types or resource

availability.

  • Their cooperation is constrained by a graph.
  • Unsaturated demand.
  • Indifferent in neighbors’ resources.
slide-42
SLIDE 42

Service & Resource Exchange over Networks

  • Various decentralized technological networks:
  • Peer-to-peer file sharing overlays.
  • Wireless mesh networks, Wi-Fi communities, Mobile Internet sharing.
  • Renewable energy sharing in smart grid.
  • Sharing economy platforms:
  • Online bartering: swap.com, neighborgoods.net, etc.
  • Food sharing, favor exchanging, risk sharing, etc.
  • More examples: http://www.collaborativeconsumption.com/
  • L. Georgiadis, G. Iosifidis, L. Tassiulas, ”Exchange of Services in Networks: Competition,

Cooperation, and Fairness”, ACM Sigmetrics, 2015.

slide-43
SLIDE 43

Model

  • An undirected connected graph G = (N, E).
  • Set of allocations:

D =

  • d = (dij)(i,j)2E : dij 0,

X

j2Ni

dij = Di}

  • Set of feasible received resource vectors:

R =

  • r = (ri)i2N : ri =

X

j2Ni

dji, i 2 N, d 2 D ,

  • Individual node’s objective: to maximize his received resource ri, i 2 N.
  • Exchange ratio vector:

ρi = ri Di , ρ = (ρi = ri Di : i 2 N)

slide-44
SLIDE 44

Central Coordination Fair Allocations

  • Question: Which is a sensible allocation?
  • Ideal allocation: ri = Di, ∀ i ∈ N, i.e., ρi = 1
  • Else: balance the exchange ratios as much as possible.
  • Lexicographically optimal (Max-min fair) vector of exchange ratios ρ.
  • There is a unique lex-optimal vector of exchange ratios ρ⇤ ⌫ ρ.
  • Set R of received resource vectors is compact and convex, and ρi = ri/Di.
  • Also interested in the allocations d⇤ that yield ρ⇤.
  • While ρ⇤ is unique, there are many allocations d⇤ .
  • Question: What are the main properties of ρ⇤ .
slide-45
SLIDE 45

Properties of ρ∗

  • There is a unique ρ⇤ and one or more d⇤ 2 D, with properties:
  • Nodes are partitioned in distinct exchange ratio sets

L1, L2, . . . , L7.

  • K = 7 depends on G and {Di} .
  • L7 nodes work only with L1 nodes, and so on.
  • It holds: l1 · l7 = l2 · l6 = . . . = 1.
  • Topology: Lk is independent in the induced graph

GQk = (Qk, EQk ), k = 1, . . . , 3, where Qk = N − ∪k1

m=1(Lm ∪ LKm+1).

  • Topology: L⇤

Kk+1 = NQk

  • L⇤

k

  • , k = 1, ...., 3.
  • Theorem: If an allocation policy satisfies the above properties, then it is

lex-optimal.

slide-46
SLIDE 46

Stability wrt Trade

  • A Competitive Market.
  • Every node i ∈ N determines independently his allocation policy
  • dij
  • j2Ni
  • Objective: maximize P

j dji, or, equivalently, the ratio ρi = ri/Di.

  • Ratio ρi can be interpreted as the price that node i sells his resource.
  • An allocation d⇤ is an exchange equilibrium iff 8i 2 N:
  • dji = dij · ρi, ∀ j ∈ Ni .
  • if dji > 0 for some j ∈ Ni, then ρj = mink2Ni ρk .
  • Does an exchange equilibrium exist?
  • General Equilibrium theory: equilibrium exists under some mild conditions.
  • Existence conditions do not apply in the proposed model:
  • Not all nodes are endowed with non-zero quantities.
  • Prices are not given exogenously; instead, they are indirectly determined by

the nodes’ decisions.

  • K. J. Arrow, G. Debreu, ”Existence of and Equilibrium for a Competitive Economy”,

Econometrica 22(3), 1954.

slide-47
SLIDE 47

Stability wrt Trade

Theorem.

1 There is a lex-optimal allocation d⇤ under which every node i 2 N gives

resource to its neighbors in proportion to what it gets from them, i.e., d⇤

ji

d⇤

ij

= r ⇤

i

Di = ρ⇤

i , 8 j 2 Di . 2 The neighbors not receiving resource from i have higher ratio ρj, i.e.,

ρ⇤

j 1

ρ⇤

i

, 8 j 2 Ni Di .

3 If the allocation satisfies the above conditions, then it is lex-optimal.

  • Interpretation:
  • There is a lex-optimal allocation where every node i ∈ N serves its

neighbors with the same exchange ratio (or, not at all).

  • Any possible exchange equilibrium is also a lex-optimal allocation.

The competitive interactions of users embedded in a graph yield the same allocation point a central designer would have selected.

slide-48
SLIDE 48

Stability wrt Coalitions

  • Assume that subsets of nodes may decide to exchange only among

themselves.

  • NTU Coalitional Service Exchange game:
  • Played over the graph G = (N, E), by N players.
  • Each node i has strategy di =
  • dij : j ∈ Ni, P

j dij = Di

  • , and utility ri.
  • (Strong) Stability Definition:
  • An allocation d (and the resource vector r) is called strongly stable if

∀S ⊆ N, there is no allocation b dS on the induced subgraph GS = (S, ES), such that b ri ≥ ri ∀i ∈ S, and b rj > rj for at least one node j ∈ S.

  • Theorem: The only (strongly) stable allocations with respect to

coalitions are those with lexicographically optimal resource vectors r⇤.

  • Hence, the solution of the graph-constrained coalitional game has the above

topological and price properties.

slide-49
SLIDE 49

Dynamic Interactions

  • How can the nodes find this equilibrium?
  • Dynamic setup:
  • Each node i creates ”service token” (e.g., relay opportunity) according to a

Poisson process with rate λi = Di.

  • Every token is allocated to the neighbor with the lowest exchange rate (i.e.,

larger reciprocation).

  • Decentralized and asynchronous best response under limited information.
  • Extensive numerical results show that the system converges to the

unique vector of exchange ratios ρ⇤.

  • Previous works showed convergence numerically for similar models, or

even proved it under certain conditions.

F . Wu, et al, Proportional Response Dynamics Leads to Market Equilibrium, ACM STOC’ 07

  • B. Birnbaum, et al., Distributed Algorithms via Gradient Descent for Fisher Markets, EC’ 11
  • R. Cole, et al., Fast-Converging Tatonnement Algorithms for One-Time and Ongoing Market

Problems, ACM STOC’ 08.

slide-50
SLIDE 50

Overview

  • The above models are motivated by the sharing economy.
  • MNOs and start ups are already employing similar ideas.
  • Novel opportunities for fundamental and experimentation-driven research.
  • What will be the Uber, or Airbnb model for wireless networks?
  • Mobile data offloading (leased) architectures.
  • Leverage dormant user-owned capacity.
  • Designed an efficient market mechanism.
  • Move towards carrier-grade offloading solutions.
  • UPN collaborative systems.
  • Bottom-up networking solutions.
  • Designed a resource allocation policy.
  • Implemented a prototype system.
  • Network resource exchange economies.
  • Decentralized and dynamic bartering markets.
  • Characterized the structure and efficiency of equilibriums.