395 research outputs found

    Interplay between security providers, consumers, and attackers: a weighted congestion game approach

    Get PDF
    Network users can choose among different security solutions to protect their data. Those solutions are offered by competing providers, with possibly different performance and price levels. In this paper, we model the interactions among users as a noncooperative game, with a negative externality coming from the fact that attackers target popular systems to maximize their expected gain. Using a nonatomic weighted congestion game model for user interactions, we prove the existence and uniqueness of a user equilibrium, compute the corresponding Price of Anarchy, that is the loss of efficiency due to user selfishness, and investigate some consequences for the (higher-level) pricing game played by security providers.Game theory;Weighted games; Security

    Competition among providers in loss networks

    Get PDF
    International audienceCommunication networks are becoming ubiquitous and more and more competitive among revenue-maximizing providers, operating on potentially different technologies. In this paper, we propose to analyze thanks to game theory the competition of providers playing with access prices and fighting for customers. Considering a slotted-time model, the part of demand exceeding capacity is lost and has to be resent. We consider an access price for submitted packets, thus inducing a congestion pricing through losses. Customers therefore choose the provider with the cheapest average price per correctly transmitted unit of traffic. The model is a two-level game, the lower level for the distribution of customers among providers, and the upper level for the competition on prices among providers, taking into account what the subsequent repartition at the lower level will be. We prove that the upper level has a unique Nash equilibrium, for which the user repartition among different available providers is also unique, and, remarkably, efficient in the sense of social welfare (with a so-called price of anarchy equal to one). Moreover, even when adding a higher level game on capacity disclosure with a possibility of lying for providers, providers are better off being truthful, and the unique Nash equilibrium is thus unchanged

    An Optimal Congestion and Cost-Sharing Pricing Scheme for Multiclass Services

    Get PDF
    We study in this paper a social welfare optimal congestion-pricing scheme for multiclass queuing services which can be applied to telecommunication networks. Most of the literature has focused on the marginal price. Unfortunately, it does not share the total cost among the different classes. We investigate here an optimal Aumann-Shapley congestion-price which verifies this property. We extend the work on the Aumann-Shapley price for priority services, based on the results on the marginal price: instead of just determining the cost repartition among classes for rates, we obtain the rates and charges that optimize the social welfare

    Estimating the Probability of a Rare Event Over a Finite Time Horizon

    Get PDF
    We study an approximation for the zero-variance change of measure to estimate the probability of a rare event in a continuous-time Markov chain. The rare event occurs when the chain reaches a given set of states before some fixed time limit. The jump rates of the chain are expressed as functions of a rarity parameter in a way that the probability of the rare event goes to zero when the rarity parameter goes to zero, and the behavior of our estimators is studied in this asymptotic regime. After giving a general expression for the zero-variance change of measure in this situation, we develop an approximation of it via a power series and show that this approximation provides a bounded relative error when the rarity parameter goes to zero. We illustrate the performance of our approximation on small numerical examples of highly reliableMarkovian systems. We compare it to a previously proposed heuristic that combines forcing with balanced failure biaising. We also exhibit the exact zero-variance change of measure for these examples and compare it with these two approximations

    A distributed auction-based algorithm to allocate bandwidth over paths

    Get PDF
    Session 01 : Scheduling and bandwidth allocationInternational audienceIn the literature, Vickrey-Clark-Groves (VCG) double-sided auctions have been applied to inter-domain traffic exchange because they provide incentives to be truthful and lead to an efficient use of the network, among relevant properties of mechanism design. Unfortunately, the resulting resource allocation scheme is neither budget-balanced nor solvable in a decentralized way, two important properties. We present a different but more realistic auction-based algorithm for allocating bandwidth over paths to end users or ISPs, leading to a new budget-balanced pricing scheme for which allocations and charges can be computed in a decentralized way

    Network Neutrality: Modeling and Challenges and its Impact on Clouds: Keynote Talk

    Get PDF
    International audienceNetwork neutrality has been a very sensitive topic of discussion all over the world. During this talk, we will first introduce the elements of the debate and introduce how the problem can be modeled and analyzed through game theory. With an Internet ecosystem much more complex now than the simple delivery chain Content-ISP-User, we will in second step highlight how neutrality principles can be bypassed in various ways without violating the rules currently evoked in the debate , for example via CDNs, or via search engines which can affect the visibility and accessibility of content. We describe some other grey zones requiring to be dealt with and spend some time on discussing the (potential) implications for clouds

    A Randomized Quasi-Monte Carlo Simulation Method for Markov Chains

    Get PDF
    We introduce and study a randomized quasi-Monte Carlo method for estimating the state distribution at each step of a Markov chain, under the assumption that the chain has a totally ordered (discrete or continuous) state space. The number of steps in the chain can be random and unbounded. The method simulates nn copies of the chain in parallel, using a (d+1)(d+1)-dimensional low-discrepancy point set of cardinality nn, randomized independently at each step, where dd is the number of uniform random numbers required at each transition of the Markov chain. This technique is effective in particular to obtain a low-variance unbiased estimator of the expected total cost up to some random stopping time, when state-dependent costs are paid at each step. We provide numerical illustrations where the variance reduction with respect to standard Monte Carlo is substantial. The variance is reduced by factors of several thousands in some cases. We prove bounds on the convergence rate of the worst-case error and variance for special situations. In line with what is typically observed in RQMC contexts, our empirical results indicate much better convergence than what these bounds guarantee

    Impact of Content Delivery Networks on service and content innovation

    Get PDF
    International audienceContent Delivery Networks (CDNs) are major actors of the current telecommunication ecosystem. Our goal in this paper is to study their impact on other actors of the supply chain, especially on content innovation which is a key concern in the network neutrality debate where CDNs' role seems forgotten. Our findings indicate that vertically integrating a CDN helps Internet Service Providers (ISPs) collect fees from Content Providers (CPs), hence circumventing the interdiction of side payments coming from net-neutrality rules. However, this outcome is socially much better in terms of user quality and innovation fostering than having separate actors providing the access and CDN services: in the latter case double marginalization (both ISP and CDN trying to get some value from the supply chain) leads to suboptimal investments in CDN storage capacities and higher prices for CPs, resulting in reduced innovation

    Users facing volume-based and flat-rate-based charging schemes at the same time

    Get PDF
    International audienceIn the Internet, the data charging scheme has usually been flat rate. But more recently, especially for mobile data traffic, we have seen more diversity in the pricing offers, such as volume-based ones or cap-based ones. We propose in this paper to study the behavior of heterogeneous users facing two offers: a volume-based one and a flat-rate one. On top of that selection, we investigate 1) the relevance for an ISP to propose the two types of offers, and optimize the corresponding prices, and 2) the existence of a solution to the pricing game when the offers come from competing providers
    • 

    corecore