LArge-scale Internet applications, such as video streaming
|
|
|
- Gervase Russell
- 9 years ago
- Views:
Transcription
1 Public Internet (Application Providers) Public Internet (Application Providers) JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 idaas: Inter-Datacenter Network as a Service Wenxin Li, Deke Guo, Keqiu Li, Heng Qi, and Jianhui Zhang Abstract Current-generation Internet-scale applications, such as video streaming, incur a large amount of wide area traffic. Transmitted on the unreliable Internet with no bandwidth guarantees, such traffic is suffering unpredictable network performance, which is however unappealing to the application providers. Fortunately, Internet giants like Google and Microsoft are increasingly deploying their private wide area networks (WANs) to connect their datacenters on the globe. Such private WANs are highly reliable, and can provide predictable network performance. In this paper, we propose a new type of service inter-datacenter network as a service (idaas), where application providers, make bandwidth reservations for bandwidth guarantees from those Internet giants to support their wide area traffic. We study a bandwidth trading market of multiple idaas providers and application providers, and concentrate on the essential bandwidth pricing problem. The challenging issue involves in pricing in such a market is that the benefits of both idaas providers and application providers are close-knit connected. To address this issue, we model the interaction between idaas providers and application providers as a Stackelberg game, and analyze the existence and uniqueness of the equilibrium. We further present an efficient bandwidth price computation algorithm by blending the advantage of a geometrical Nash bargaining solution and the demand segmentation method. Based on the computed price, we present two bandwidth reservation algorithms, where each idaas provider s bandwidth are reserved in a weighted fair manner and a max-min fair manner, respectively. Finally, we conduct comprehensive trace-driven experiments. The evaluation results show the efficiency of our proposed algorithms in the bandwidth market. INTRODUCTION LArge-scale Internet applications, such as video streaming and social network, provide service to hundreds of millions of users. The enormous, and growing user demand has motivated application providers to place their application instances across multiple geographical regions, such as Netflix []. Accordingly, a large volume of wide area traffic will exist between different business regions due to the routine background computation and periodic data back up tasks. As revealed in [2], the wide area traffic accounts for up 45% of the total traffic of a typical business provider. A recent survey further highlights that the requirement of such wide area traffic will double or triple in the next two to four years [3]. Traditionally, most application providers acquire bandwidth from Internet Service Providers (ISPs) for their wide area traffic. While this will result in unpredictable and unreliable network performance for the application providers since the network bandwidth is shared in a best effort manner in today s Internet. Nowadays, they can be freed from such performance issues with the success of private wide area networks (WANs) hosted by some Internet giants. For instance, Google B4, a private WAN connecting Google s datacenters across the planet, is high reliable and can provide guaranteed network performance [4]. In addition to the performance advantage, each datacenter in the WAN can actually perform well as a router with its abundant resources [5]. In light of these reasons, we design a new type of service, inter-datacenter network as a service (idaas), for companies W. Li, K. Li, H. Qi, and Jianhui Zhang are with the School of Computer Science and Technology, Dalian University of Technology, No 2, Linggong Road, Dalian 623, China. [email protected], {keqiu, hengqi}@dlut.edu.cn, [email protected]. D. Guo is with the College of Information System and Management, National University of Defense Technology, Changsha 473, P.R. China. [email protected]. Request Request Datacenter er network Request Datacenter network Transit idaas Provider Transit Transit Transit Transit Datacenter network Public Internet (Application Providers) Request Datacenter network Private WAN Request Request Fig.. An illustrative example of the new service idaas, where there are multiple application providers and a single idaas provider that hosts a private WAN connecting a large number of datacenters on the globe. like Google, Microsoft that host such private WANs [6]. In this service, application providers acquire bandwidth from idaas providers for their wide area traffic. Fig. plots an illustrative example for this novel service in a scenario of a single idaas provider and multiple application providers. Each application provider can send its bandwidth request to the closest datacenter via the front end server or border router offered by the idaas provider. On receiving the bandwidth request, idaas provider will open a tunnel and allocate the requested bandwidth to it, such that the application provider s wide area traffic can be transmitted on the inter-datacenter links with bandwidth guaranteed. When application providers are on board to use this new type of services, we believe that there will be a bandwidth market between application providers and idaas providers. The commodities to be traded in such a market consist of bandwidth reservation, so that the application performance can be guaranteed. Consequently, an emerging bandwidth pricing problem dominates the utility of such a market and hence should have priority to be tackled. However, current
2 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 2 pricing method, i.e., the simple pay-as-you-go model based on the number of bytes transferred [7], is insufficient as a model to price bandwidth guarantees. Pricing in such a bandwidth trading market is a significantly challenge task. On the one hand, each idaas provider normally sets its per unit bandwidth price based on the total reserved bandwidth (workload) [8]. As idaas providers compete with each other for bandwidth demand with the aim of maximizing the revenue, the per unit bandwidth price of each idaas provider can be dynamically changed in the market. On the other hand, given the bandwidth price, each application provider seeks the optimal bandwidth reservation strategy to minimize its payment and still desires to be completely served in terms of its demand. While all application providers may together influence the price of an idaas provider. Based on the above guidelines, we believe that an efficient bandwidth pricing policy must benefit both providers and users. Accordingly, we are motivated to model the interaction between providers and users as a two-stage Stackelberg game [9]. In the first stage, idaas providers cooperative with each other in a Nash bargaining game, and make decisions on the bandwidth price and the size of bandwidth they are willing to allocate, based on the total bandwidth demand issued by application providers. In the second stage, application providers compete with each other in a noncooperative game, and decide on how much bandwidth they will reserve from each idaas provider. Theoretical analysis shows that there exists a unique Nash equilibrium in the noncooperative game. In order to compute the bandwidth price and bandwidth reservation in an efficient and practical way, we propose a bandwidth price computation algorithm by blending the advantage of the geometrical Nash bargaining solution [] and the demand segmentation method. We particularly present two bandwidth reservation algorithms, which reserve each idaas provider s bandwidth in a weighted fair manner and max-min fair manner, respectively. Finally, we use comprehensive trace-driven simulations to demonstrate the efficiency of our algorithms in the market of multiple idaas providers and multiple application providers. The major contributions of this paper are as follows: We make the first attempt to propose a new type of service inter-datacenter network as a service, for Internet giants (idaas providers) that hosts large private wide area network to connect their geographically distributed datacenters on the globe. In particular, we study a bandwidth market consisting of multiple idaas providers and application providers, and concentrate on the essential bandwidth pricing problem. To benefit both idaas providers and application providers, we model the interaction between providers and users as a two-stage Stackelberg game. It contains a cooperative game among idaas providers and a noncooperative game between application providers. We perform a theoretical analysis with respect to the Nash equilibrium of the noncooperative game. We design an efficient and practical bandwidth price Number of flows 5 x Wide area traffic Other traffic Fig. 2. The number of flows for the extracted wide area traffic from 7 most frequently used ports in traffic between Yahoo! datacenters. computation algorithm based on the geometrical Nash bargaining solution and demand segmentation method. We further put forward a weighted fair bandwidth reservation algorithm and a max-min fair bandwidth reservation algorithm. We conduct comprehensive trace-driven experiments. The experimental results verify the efficiency our algorithms in terms of both idaas provider s revenue, and application provider s utility of getting fully served with less payment. In addition, the evaluation results show that the per unit bandwidth price decreases as the bandwidth demand increases, which are close to real-life situations. The rest of this paper is organized as follows. In Section 2, we discuss the background and present our system model. In Section 3, we apply a two-stage Stackelberg game to model the interaction between providers and users. In Section 4, we present our implementation algorithms. In Section 5, we present the performance evaluation. Related work are presented in Section 6. Finally, the conclusions are discussed in Section 7. 2 BACKGROUND AND SYSTEM MODEL 2. Background Current Internet suffers from reliability and network performance issues [], [2]. In spite of this, large-scale application providers are still relying on such unreliable Internet for their wide area traffic, which can result in highly unpredictable network performance for them. Benson et.al recently reported that such wide area traffic accounts for 4-9% of the total traffic in a typical business [3]. A recent survey further highlights that the requirement of such wide area traffic will double or triple in the next two to four years [3]. To have a roundly understanding of the wide area traffic, we detailed analyze some network flow datasets provided by Yahoo! [4]. The datasets not only contain traffic between Yahoo! servers and client, but also contain traffic between different Yahoo! datacenters. Each record in the NetFlow data includes following fields: ) timestamp, 2) source and
3 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 3 destination IP address, 3) source and destination port, 4) protocol, 5) number of packets and bytes transferred from the source to the destination. Since all IP addresses in the datasets are permuted to hide the identities of Yahoo! users, we extracted the wide area traffic based on the study of [2]. This study reports that the wide area traffic accounts for up 45% of Yahoo! total traffic. In this paper, we only extracted the wide area traffic passing through ports 8, 25, 97, 4, 57, 42, and 43, which are most frequently used ports in traffic between Yahoo! datacenters as revealed in [2]. Fig. 2 shows the number of flows for the extracted wide area traffic in a 96-period of time (each interval is 5 minutes). We can easy check that the extracted wide area traffic accounts for up % on average throughout the day. In view of the enormous, and rapidly growing wide area traffic, the phenomenon of unpredictable performance can further be worse in the current Internet. In contrast, we find that private wide area network deployed by some Internet giants among their geographically distributed datacenters, i.e., Google B4 [4], are highly reliable and can provide guaranteed network performance. This implies that application providers can now rent bandwidth from those Inter giants for their large amount of wide area traffic. In this way, datacenters only need to access these traffic, push them to the private wide area network, and finally forward them to the destinations. Each datacenter is exactly similar to a router. In fact, J.Roberts reports that a datacenter can actually do routing in the Internet with the abundant resources (computation, storage, and network) [5]. Following this guidelines, we consider that private wide area networks owned by some Internet giants can be offered as a service to application providers which have large amount of wide area traffic to be transmitted. Looking ahead, we believe that these efforts may force many companies to provide such service. In the following, we focus on a model of multiple idaas providers and multiple application providers. 2.2 System Model In this section, we describe the system model and the main system parameters. We consider a market of multiple idaas providers and multiple application providers in Figure 3. Each idaas provider hosts a large amount of WAN transit bandwidth, and sells them to the application providers at a certain price. Each application provider sends its bandwidth demand, and buys it from multiple idaas providers. The controller in this market, is mainly used to collect the global information and to make optimal decisions for both idaas providers and application providers, and can be deployed by some agents or brokers, i.e., Zimory, an emerging intermediators connecting buyers and sellers of resources [5] idaas Providers and Application Providers We consider that there are N idaas providers. The set of providers is denoted by N ={, 2,..., N}. Each idaas provider i has v i amount of bandwidth, which is available for reservation. Each idaas provider sets a per unit bandwidth price that they are willing to charge from application providers, while such per unit bandwidth price is normally a function of the total reserved bandwidth on the idaas provider [8]. To better indicate this, we let P i (x i ) denote AP d idaas Provider Capacity c Price P(x) AP2 d2 Controller idaas Provider 2 Capacity c2 Price P(x2) Fig. 3. A system of multiple idaas providers and multiple application providers. the per unit bandwidth price of idaas provider i, where x i represents the total reserved bandwidth on the i-th provider. Similarly, we consider that there are M application providers. The set of application providers is denoted by M={, 2,..., M}. Each application provider has a bandwidth demand d j, and hopes to get the guaranteed bandwidth from multiple idaas providers. Let x i,j represent the amount of bandwidth that application provider j reserved from idaas provider i. Recall that the total reserved bandwidth of idaas provider i can now be expressed as x i = j M x i,j. In the following, we define the bandwidth reservation strategy and policy for application providers. Definition. A bandwidth reservation strategy relative to application provider j is x j = {x,j,..., x N,j }. The set of bandwidth reservation strategies x = {x j :,..., M} forms a bandwidth reservation policy Pricing bandwidth reservation Each idaas provider i charges application providers some fee for accommodating a certain amount of bandwidth according to some bandwidth pricing strategy P i ( ). It is important to keep in mind that such bandwidth pricing strategy must be close to real-life situations: the more users buy some goods, the lower the unit price. Considering such guideline, our intuition is to use a smooth but fast-decreasing function to measure the per unit bandwidth price. Such price function should have gradual change rate both at the beginning (highest price) and around stable value (lowest price). This is exactly a Logistic-like pricing function that is widely used in the Internet peering pricing [6]. Applying the Logistic-like pricing, P i (x i ) can be modeled as follow: P i (x i ) = L i + C i + A i e B ix i, () where L i >, A i >, <B i <, C i > are parameters specified by idaas provider i. Key mechanisms and benefits of the Logistic-like pricing is shown in Fig. 4. We can find that such a Logistic-like pricing p i (x i ) can be controlled to slowly decrease at the beginning, fast decrease in the middle, and finally infinitely
4 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 4 P i (x i ) L i +C i /(+A i ) L i Highest price Lowest price Slowly decrease Infinite close to the lowest price Fast decrease Fig. 4. Key mechanisms and benefits of the Logistic-like pricing. close to a stable value. Clearly, the price is maintained between the lowest price (L i ) and the highest price (L i + Ci +A i ). Such properties imply that the more application providers buy the bandwidth, the lower the per unit price, but not be free. Different idaas provider may have different parameters configuration, such that the price can be different from each other. For easy presentation, we formally define the bandwidth pricing strategy and policy as follows: Definition 2. A bandwidth pricing strategy P i ( ) relative to provider i is a decreasing function P i (x i ) of x i [, c i ], which is defined in Eq. (). The collection of bandwidth pricing strategies {P i ( ) : i=,..., N} forms a bandwidth pricing policy. 3 PROVIDERS AND USERS INTERACTION: A STACKELBERG GAME APPROACH In this section, we define the utility function for both idaas providers and application providers, formulate the interaction between idaas providers and application providers as a Stackelberg game and analyze the equilibrium existence and uniqueness of the game. Based on the model described in Section 2, we consider that both idaas providers and application providers are rational and selfish. As idaas providers have the right to decide the bandwidth price that they are willing to charge from application providers, so as to maximize its own utility in terms of its own revenue. Application provider, which is competitive with other application provider, decides only the payment it is willing to make, under the announced price with the aim of getting fully served without making too much payment. Therefore, it is a typical two-stage leader-follower game which can be analyzed under the Stackelberg game framework [9], where, idaas provider, the leader of the game, optimizes its strategy based on the knowledge of the total bandwidth demand of followers (application providers). 3. Utility functions Now we give a concrete expression of utility functions, based on which, the existence and uniqueness of the Nash Equilibrium is analyzed. x i The utility function of idaas provider is defined to be the sum of the revenue it collects from the application providers, which is calculated as follow Q i (x i ) = P i (x i ) x i,j. (2) j M Since application provider competes with each other, the change in one application provider s utility is likely to cause the changes in other application providers utilities. Based on above guideline, we let the utility of application provider j be denoted by U j (x i,j, x i ), which is a function of two arguments, namely x i,j and x i. In this paper, we consider that a selfish application provider always ) expects to get fully served in terms of its demand, and 2) tries to reduce the bandwidth reservation price it has to pay. To put these formally, we define the utility of application provider j to be the negative value of the sum of its payment to each idaas provider. U j (x i,j, x i ) = i N P i (x i )x i,j. (3) Since each application provider j M has a strong desire of getting the guaranteed bandwidth, which means that its bandwidth demand should be fully satisfied. Hence, each application provider involves in solving the following utility maximization problem, max x i,j U j (x i,j, x i ) s.t. x i,j = d j. (4) i N In this way, each application provider s requirement of ) and 2) can be met. 3.2 Maximizing idaas provider s utility The leader of the Stackelberg game, idaas provider, optimizes its bandwidth pricing strategy in order to maximize its revenue according to Eq. (2), being aware of the total bandwidth demand of application providers. In this paper, we consider a Nash bargaining game, which can be described as follow: the total bandwidth demand D= j d j can be viewed as the commodity, N idaas providers can be viewed as players who are competing for the bandwidth demand. Each player enters the game with an utility function, which is described by Eq. (2). All the players cooperate in this game to achieve a win-win solution, in which the product of utility gains of all players are maximized. max x i Q i (x i ) i N s.t. x i v i, i N, x i = D, i N where the first constraint means that the total reserved bandwidth on each idaas provider cannot exceed its bandwidth capacity, and the second constraint means that the total reserved bandwidth should equal to the total demand of application providers. Once Eq. (5) is solved, then the bandwidth price of each idaas provider can be computed, and thus can be announced in the bandwidth market. (5)
5 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER Competition among application providers Given the bandwidth price and the amount of bandwidth that idaas providers are willing to share, each application provider makes its bandwidth reservation strategy according to its own utility maximization in Eq. (4). Clearly, one application provider s utility is likely to affect other one s, and since application providers are selfish, we are actually faced with a noncooperative game [7]. Thus, we are interested in the Nash solution of the game. In other words, we seek an optimal bandwidth reservation policy, such that no application provider can improve its own utility by unilaterally changing its own reservation strategy. In the following, we formally define such an optimal bandwidth reservation policy. Definition 3. A bandwidth reservation policy x is the Nash equilibrium (NE) if, for all j M, the following conditions holds: U j (x i,j, x i ) = max x i,j U j (x i,j, x i j +x i,j ), (6) where x i j is the other application providers bandwidth reservation strategies except j. In general, a Nash equilibrium exists in a competitive noncooperative game when each player has a concave function as the utility. For completeness, we analyze the NE existence and uniqueness of the game between application providers in the following theorem. Theorem. (Existence and Uniqueness) A unique Nash equilibrium point exists, if A i >, i and for all i N and j M, the following equation is satisfied 4 (2 + B i A i e B ix i ) < x i,j. (7) Proof: Please refer to the Appendix A. In the following, we present algorithms to compute the optimal bandwidth pricing policy and the bandwidth reservation policy, such that both idaas providers and application providers are enjoying the maximum utility. 4 IMPLEMENTATION ALGORITHM In this section, we propose an efficient price computation algorithm by blending the advantage of the geometrical representation of Nash bargaining games [] and the demand segmentation method. Then, we present two bandwidth reservation algorithms based on the pre-computed bandwidth price and the amount of bandwidth that idaas providers are willing to share. 4. Price computation As described in the above Section, given the total bandwidth demand of application providers, idaas providers are actually playing a Nash Bargaining game where players cooperate with each other to achieve a win-win solution, such that each player gains the maximum utility. Note that the problem in Eq. (5) is usually approximatively solved by numerical methods like gradient projection method [8], which requires numerous iterations. Since our objective is an efficient price computation algorithm that can be implemented in real-world controller hosted by agents or brokers and executed in a lightweight fashion, we propose an efficient bandwidth price computation algorithm based on the geometrical representation of Nash bargaining games, in which the concept of utility-distance product is introduced to unify idaas providers utilities for a certain amount of demand. The computation overhead of the algorithm is significantly reduced. 4.. A primer on the geometrical game 2 2 Player Commodity Fig. 5. An illustrative example of 2-player geometrical game. A geometrical Nash bargaining game can be described in some low-dimensional space in the region of Euclidean Geometry. For example, Fig. 5 shows a 2-dimensional spacial game, which represents a 2-player bargaining game. Utilities of the two players for commodity and 2 are clearly denoted by the distance l i, and l i,2, where i {, 2} represents the player. In this example, commodities are presented as points based on their spatial proximities, which lie within the boundary enclosed by all players. The relative distance of player i for commodity k is defined as a function of the inverse of player i s utility compared to the sum of the inverse of all players utilities, i.e., l i,k = /R i,k i (/R, i, k (8) i,k) where R i,k is player i s utility for commodity k in the geometrical game. We can find that the higher a player s utility for one commodity, the closer it is to the commodity. The distance of each commodity to all players are normalized, and they add up to a unitary value, i.e,, i l i,k =, k. As demonstrated in Fig. 5, player prefers to commodity, while player 2 prefers to commodity 2. In the bargaining process, each player selects commodities based on their relative distances to him. Accordingly, commodities with higher utility will be selected with a higher priority. Usually, the utility-distance product is similar to the moment of force in a lever system, the utility distance product of a player to a commodity is defined as φ i,k = l i,k R i,k. (9) Fig. 6 shows an example of finding the pivot point in a 2-player game. In this example, each player sorts all the commodities based on their distances to it. In a typical lever system, weights are aligned along the lever, such that the collective moment generated by weights on the left hand side equals to that on the right hand side. Similar, in order to achieve an equilibrium in the geometrical game, the sum of utility distance product should be equally partitioned among all players. In Fig. 6, player and 2 are lying at the two end points of the lever, where the utility distance products of commodities are regarded as force moments.
6 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER k= Pivot Fig. 6. Finding the pivot point in a 2-player game, which is similar to a lever system. We can easy find that pivot point of the lever in this example should be lying in point 4, where the collective moment 4 k= φ,k= 7 k=4 φ 2,k. As a matter of fact, the pivot point in the 2-dimensional geometrical game is determined by balancing the moments between two players: μ = φ i,k. () 2 k K After determining the pivot point, the bargaining solution is to assign commodities lying on the left side to player, and commodities lying on the right side to player Algorithm design Our problem in Eq. (5) can not be readily solved by applying such a geometrical game due to the following fact. The commodity in the Nash bargaining game between idaas providers is the total demand issued by all the application providers, which means that there is only one commodity. Simply solving Eq. (5) by a geometrical game is likely to result in a case where there is only one player gets the commodity and accommodates all the bandwidth demand from application providers. Clearly, this result gravely contradicts a win-win Nash bargaining solution, since each idaas provider can actually get a portion of the total demand. To address this challenge, we apply the demand segmentation method. We split the commodity into K subcommodities, where K is an infinity number. All the subcommodities constitute a set K={,..., K}, where each sub-commodity k occupies a portion of the total demand. Here, we consider each sub-commodity has a same demand, i.e., r k = D K, k. Therefore, we now can solve Eq. (5) by applying a multi-player geometrical game, which is described as follow: N idaas providers are viewed as players, who are competing for K sub-commodities. Since different player has different utility for different sub-commodity, we let player i s utility for sub-commodity k be defined as follow: Q i (r k ) = P (r k )r k. () Extending the definitions in the above 2-players game, we get the distance and utility-distance product in our multiplayer geometrical game. The distance between player i and sub-commodity k is defined as follow l i,k = /Q i(r k ) i (/Q, i N, k K. (2) i(r k )) Algorithm Bandwidth price computation Input: Total bandwidth demand: D; Bandwidth capacity: v i, i N ; parameters: A i, B i, C i, L i, i N ; Output: Price and reserved bandwidth {(P (x i ), x i ) : i N } : Sort all idaas providers in N in the increasing order of its bandwidth capacity v i 2: Initialize D left = D, N left = N 3: for each idaas provider i N do 4: mean D left N left 5: x i min{v i, mean} 6: D left D left x i 7: N left N left 8: end for 9: Each idaas provider i computes its bandwidth price according to Eq. () We can easy check that the sum distance of all the players to each sub-commodity k is unitary, i.e., i N l i,k =, k. The utility-distance product of player i to commodity k is defined as φ i,k = l i,k Q i (r k ), i N, k K. (3) In the ideal condition when all the players constitute a multi-dimensional lever system and all sub-commodities lie along the lever, the determination of the pivot location can be based on balancing the utility-distance product with respect to all players. μ i = φ i,k, i N (4) N k K The following theorem shows the amount of bandwidth demand issued to each idaas provider in the multi-player geometrical game. Theorem 2. In the multi-player geometrical representation of our Nash bargaining game, the amount of demand that each idaas provider i gets should be min{v i, D N }. Proof: Please refer to the Appendix B. Based on the guideline of Theorem 2, we can now design our bandwidth price computation algorithm which are simple and lightweight. The key idea is that the total bandwidth demand are allocated to idaas providers based on their capacities and the average demand, and if an idaas provider s capacity is less than the average demand, then the unallocated demand should be equally allocated to other idaas providers. Therefore, our bandwidth price algorithm starts with sorting all the idaas providers in the increasing order of its capacity v i. For each idaas provider i, the algorithm computes the demand that can allocate to it. Once the demand allocation process is accomplished for one idaas provider, the average demand is updated. After the demand allocation is finished for all idaas providers, the final step is to compute each idaas provider s bandwidth price, which is useful for application provider s bandwidth reservation. The bandwidth price computation algorithm based on the geometrical bargaining game is summarized in Algorithm.
7 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 7 Algorithm 2 Weighted fair bandwidth reservation Input: Bandwidth demand: d j, j M; The amount of bandwidth that each idaas provider are willing to share: x i, i M; Output: Bandwidth reservation variable: x i,j, i N, j M : for each i N do 2: for each j M do 3: x i,j dj x j dj i 4: end for 5: end for 6: return x i,j, i N, j M 4.2 Bandwidth reservation Given the pre-computed bandwidth price and the amount of bandwidth that each idaas providers are willing to share, we now can compute the bandwidth reservation strategy for each application provider. As described above, each application provider targets at maximizing its own utility while has a strong desire of getting fully served. One application provider s utility can significantly affect other one s and each application provider wishes to reserve more bandwidth from idaas providers with low per unit bandwidth price, and hence the amount of bandwidth of each idaas providers should be allocated in some way. In this paper, we consider two strategies for reserving bandwidth on each idaas providers: weighted fairness and max-min fairness, and thus present two algorithms. The first bandwidth reservation algorithm is based on an idea of weighted fair bandwidth reservation, which is shown in Algorithm 2. The key of this algorithm is that each application provider reserves bandwidth from each idaas provider based its relevant weight. The weight of application provider j is defined to be its demand compared to all application providers, i.e., d j, such that the sum weight j dj is unitary. The rationale for weight is that the more an application provider demands, the more bandwidth it can reserve, and finally achieve the weighted fairness among application providers. The second algorithm follows a max-min fair manner in reserving each idaas provider s bandwidth, which is summarized in Algorithm 3, with the computed bandwidth price and amount of bandwidth that each idaas provider is willing to share. This algorithm starts with sorting all the idaas providers in the increasing order of its bandwidth price (Step ), and sorting all the application providers in the increasing order of its bandwidth demand (Step 2). In Step x i M l eft } 4-3, each application provider reserves min{d j, amount of bandwidth from each idaas provider until its bandwidth demand is fully satisfied. Once an application provider has finished its bandwidth reservation process, then the application provider should be removed, and thus the mean bandwidth of each idaas provider can be updated. We can easy check that each idaas provider s bandwidth are actually reserved in a max-min fair manner. This means that if an application provider s left bandwidth demand is less than the mean bandwidth on the idaas provider, then the unreserved bandwidth will be fairly reserved by other Algorithm 3 Max-min fair bandwidth reservation Input: Bandwidth demand: d j, j M; Pre-computed parameters: x i, P i (x i ), i M; Output: Bandwidth reservation variable: x i,j, i N, j M : Sort all idaas providers in N in the increasing order of the bandwidth price P i (x i ) 2: Sort all application providers in M in the increasing order of the bandwidth demand d j 3: Initialize M left = M 4: for each j M do 5: for each i N do 6: if d j then 7: M left M left 8: Break 9: end if : x i,j min{d j, x i M left } : d j d j x i,j 2: x i x i x i,j 3: end for 4: end for 5: return x i,j, i N, j M application providers. 5 PERFORMANCE EVALUATION In this section, we use real-world traces to realistically evaluate the performance of our proposed algorithms. 5. Experiments settings We simulate that there are (N = ) idaas providers. Each idaas provider hosts an amount of bandwidth, and sells them to the application providers according to its own bandwidth pricing strategy. In our experiments, we use unit to measure the bandwidth capacity of each idaas provider. We consider two scenarios (S and S 2 ) where the bandwidth capacity v i for each idaas providers are set as a random value within [ 7, 2 7 ] units and [ 6, 2 6 ] units, respectively. Such unit can be kbps in a commonly WAN bandwidth setting ([, ]Gbps)[3], and can even become kbps when idaas provider is further developed as a representative ISP that has Gbps amount of bandwidth [9]. Note that the total bandwidth of all idaas providers can accommodate the total bandwidth demand of application providers in scenario S, while scenario S 2 cannot. Without loss of generality, the minimum per unit bandwidth price L i and the maximum per unit price associated parameter C i are set to. and for all idaas providers, respectively. Based on the guideline of Theorem and in order to make the difference between idaas providers price more clear, parameters A i and B i for all i N are set to be uniformly random within [, ] and [ 7, 2 7 ], respectively. Datasets: Our experiments are conducted on Yahoo! network flow datasets. These datasets, collected from Yahoo! border routers every 5-minute during one day, contain not only traffic between Yahoo! servers and client, but also
8 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 8 Average reserved bandwidth 2.4 x S S 2 Total demand (a) Average reserved bandwidth x Total bandwidth demand Fairness index S S 2 Totally fair.965 (b) Fairness index Reserved bandwidth 2 x Interval 3, S Interval 7, S Capacity, S Interval 3, S 2 Interval 7, S 2 Capacity, S idaas provider (c) Reserved bandwidth at sampled intervals Fig. 7. Reserved bandwidth on idaas providers for a 96-interval period of time, in terms of (a) average reserved bandwidth, (b) fairness index associated with the reserved bandwidth x i, (c) the reserved bandwidth of each idaas provider at sampled intervals 3 and 7. Average per unit bandwidth price S S 2 Total demand. (a) Average per unit bandwidth price x Total bandwidth demand Stand deviation of per unit bandwidth price S S idaas provider (b) Standard deviation of the per unit band-(cwidth price Per unit bandwidth price at sampled intervals Per unit bandwidth price Interval 3, S Interval 7, S Interval 3, S 2 Interval 7, S 2 Fig. 8. Per unit bandwidth price of idaas providers for a 96-interval period of time, in terms of (a) average per unit bandwidth price, (b) standard deviation of the per unit bandwidth price across all idaas providers, (c) the per unit bandwidth price of each idaas provider at sampled intervals 3 and 7. contain traffic between different Yahoo! datacenters. Each record in the NetFlow data includes following fields: ) timestamp, 2) source and destination IP address, 3) source and destination port, 4) protocol, 5) number of packets and bytes transferred from the source to the destination. In our experiments, we extract the traffic between different datacenters from some most frequently used ports like 8, 25, 97, 4, 57, 42, and 43, which are described in the above Section 2. The extracted inter-datacenter traffic is used to represent the wide area traffic. Although the wide area traffic we extracted actually are issued by only one application provider (Yahoo!), we believe that they can faithfully reflect traffic demand distribution, and it is appropriate to use them for the purpose of benchmarking the performance of our proposed algorithms. Therefore, we consider that the extracted wide area traffic is partitioned among multiple application providers. Each flow in the extracted traces is assumed to be issued by one application provider, and the bytes to be transferred are considered to be the bandwidth demand for that application provider. For example, if a flow needs to transfer 5 bytes from its source to destination, then we consider that the corresponding application provider demands 5 units of bandwidth. All of our experiments are conducted in minute intervals since the datasets are collected during one day. 5.2 Evaluation results and analysis For the following experiments, we consider two scenarios (S, S 2 ). In the two scenarios, bandwidth capacity v i for each idaas provider is set to be uniformly random within range [ 7, 2 7 ] and [ 6, 2 6 ], respectively Reserved bandwidth on idaas providers Fig. 7 first shows the reserved bandwidth on idaas providers for a 96-interval period of time. The average reserved bandwidth in both scenario S and S 2 is shown in Fig. 7(a). Clearly, the average reserved bandwidth on idaas providers closely follows the total demand in scenario S, while it maintains at a stable value in S 2. This is because that the sum bandwidth capacity of all idaas providers can accommodate the total bandwidth demand in each time interval for scenario S, while it cannot in S 2. A more important performance metric in the Nash bargaining game among the idaas providers is fairness. As a quantitative evaluation, we use the Jain s fairness index [2], which is defined as F = ( N i= xi)2. Fig. 7(b) shows N N i= x 2 i
9 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER x 5 x x 5 2 x 6 Average revenue S S 2 Total demand Total bandwidth demand Stand deviation of the revenue S S 2 Revenue Interval 3, S Interval 7, S Interval 3, S 2 Interval 7, S (a) Average revenue (b) Standard deviation of the revenue idaas provider (c) Revenue at sampled intervals Fig. 9. Revenue of idaas providers for a 96-interval period of time, in terms of (a) average revenue, (b) standard deviation of the revenue across all idaas providers, (c) the revenue each idaas provider at sampled intervals 3 and 7. the fairness index of the reserved bandwidth in the two scenarios S and S 2. In comparison, S is able to maintain a higher level of fairness in terms of the reserved bandwidth. Its fairness index can be up to during the extremely low bandwidth demand period (interval 6-8). The root cause is that each idaas provider s bandwidth are totally reserved in each interval for scenario S 2, while it is not for S. To understand the reserved bandwidth on a microscopic level, we also plot the reserved bandwidth on each idaas provider under two sampled intervals 3 and 7 in Fig. 7(c). Interval 3 corresponds to a high demand time, while interval 7 corresponds to a low demand time. We can easy find that the reserved bandwidth on each idaas provider is not exceeding its capacity for each sampled interval. In scenario S, most idaas provider s bandwidth are totally reserved except some with high capacity at interval 3, while each idaas provider maintains an equal reserved bandwidth at interval 7. Moreover, each idaas provider s bandwidth are totally reserved in scenario S 2 for both sampled intervals. These results exactly verify the key idea of our algorithm Per unit bandwidth price of idaas providers Fig. 8 detailed describes the per unit bandwidth price of idaas providers in a 96-interval period of time under both scenario S and S 2. Fig. 8(a) first plots the average per unit bandwidth price across all idaas providers. It is clear that the average per unit bandwidth price in scenario S is lower than that in S 2, and is completely opposite to the total bandwidth demand. This implies that the more bandwidth demand, the lower the per unit bandwidth price. Note that the average per unit bandwidth price in S is always maintained at a stable value. This is because that each idaas provider s bandwidth in scenario S 2 are totally reserved in all intervals. To understand the difference of idaas providers prices, we also plot the standard deviation of the per unit bandwidth price across all idaas providers in Fig. 8(b). We observe that S 2 always maintains a higher standard deviation of the per unit bandwidth price than S. The main reason is that reserved bandwidth on each idaas provider in S 2 are exactly its bandwidth capacity, while idaas provider s bandwidth capacity is completely different from each other. Recall that the lower bandwidth demand, the higher level of fairness in terms of the reserved bandwidth on idaas providers. Combined different parameters settings of idaas providers, L i, A i, B i, C i, it can easily be reasoned about that the standard deviation of per unit bandwidth price in scenario S is completely opposite to total demand. We also plot per unit bandwidth price for each idaas provider for both scenario S and S 2 under two sampled intervals 3 and 7. Due to the limited bandwidth capacity in S 2, the per unit bandwidth at interval 3 is identical with that at interval 7 in scenario S 2. We further observe the per unit bandwidth of most idaas providers in S 2 is higher than that in S. Moreover, in scenario S, most idaas providers maintain a lower per unit bandwidth price at interval 3 than that at interval 7. This further indicates that the more bandwidth one buys, the lower the per unit bandwidth price Revenue of idaas providers Since each idaas provider seeks to maximize its own revenue, we plot the revenue of idaas providers across a 96- interval period of time in Fig. 9. We first show average revenue across all idaas providers in Fig. 9(a). Clearly, average revenue in S is always higher than that in S 2, and closely follows the total bandwidth demand. Fig. 9(b) plots the standard deviation of revenue across all idaas providers. We observe that S 2 always maintain a lower standard deviation of the revenue than S. This may be the case that a lower reserved bandwidth indicated a higher per unit bandwidth price on each idaas provider, and the product of these two values finally reduces the variance of the revenue. We further observe that the standard deviation of revenue at lower demand intervals is higher than that at higher demand intervals in scenario S. In order to have a roundly understanding of idaas providers revenue, we also plot the revenue of each idaas provider under the two sampled interval 3 and 7 for both scenario S and S 2. Compared to S 2, S achieves a higher revenue for most idaas providers. In addition, most idaas providers get a higher revenue at interval 3 than that at interval 7. This result means that the higher bandwidth
10 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 Number 5 x Weighted, S Max min, S Total number of APPs (a) The number of demand being fully satisfied application providers Fairness index Weighted, S Max min, S (b) Fairness index Weighted, S Max min, S Bandwidth reservation x 4 Fairness index CDF (c) CDF of bandwidth reservation(d) CDF of bandwidth reservation at interval 3 at interval 7 CDF Weighted, S.96 Max min, S Bandwidth reservation x 4 Fig.. Bandwidth reservation of application providers for a 96-interval period of time with (a) the number of demand being fully satisfied application providers, (b) Fairness index of bandwidth reservation across all application providers, and CDF of bandwidth reservation for application providers at interval 3 (c) and interval 7 (d). Average payment Weighted, S Max min, S Standard deviation of payment Weighted, S Max min, S CDF Weighted, S Max min, S CDF Weighted, S Max min, S Payment Payment (a) Average payment (b) Standard deviation of payment (c) CDF of payment at interval 3 (d) CDF of payment at interval 7 Fig.. Bandwidth reservation of application providers for a 96-interval period of time with (a) average payment, (b) Standard deviation of payment across all application providers, and CDF of application provider s payments at interval 3 (c) and interval 7 (d). demand application providers issue, the higher revenue idaas providers gain Bandwidth reservation of application providers We now study the behavior of the application provider in the bandwidth trading market. Specially, we evaluate the performance of both weighted fair and max-min fair bandwidth reservation algorithms. Fig. first plots application providers bandwidth reservation in a 96-interval period of time, where the number of application providers with bandwidth demand being fully satisfied is shown in Fig. (a). We can easy find that both weighted fair and maxmin fair reservation algorithms can satisfy all application providers demand in scenario S, while they cannot in scenario S 2. This is because that the total bandwidth that idaas providers are willing to allocate are lower than the total demand of application providers in scenario S 2. We further observe that the max-min fair can satisfy more demand than weighted fair. This is because that each idaas provider s bandwidth are reserved by application providers based on the corresponding demand associated weight, such that the bandwidth reserved by each application provider can be lower than their demand when the sum offered bandwidth is less than the total demand. To study the fairness in the bandwidth reservation process for application providers, we also plot the fairness index of bandwidth reservation of application providers in Fig. (a). Similar to the fairness index described above, we let F = ( M j= x j) 2 M M denote the fairness index associated with j= x 2 j application provider s bandwidth reservation. We can easy find that both weighted fair and max-min fair in S maintain completely same fairness index. The root cause is that both of them fully satisfy all application providers demand. We also find that weighted fair in scenario S 2 achieve completely same fairness as the former two. This is because that the bandwidth reserved by each application provider is reduced in a same ratio based on the relative demand when applying the weighted fair bandwidth reservation algorithm under a low bandwidth supply condition. In comparison, the max-min fair in scenario S 2 always achieves higher fairness index than the above three. We further plot the CDF of bandwidth reservation under the sampled two intervals 3 and 7 in Fig. (c) and Fig. (d), respectively. Clearly, both weighted fair and max-min fair in scenario S achieve identical CDF curve associated with the bandwidth reservation of per application provider under both interval 3 and 7. We further observe that reservation algorithms in scenario S 2 at both interval 3 and 7 achieve higher CDF curve than that in scenario S. This result again implies that the number of demand being fully satisfied application provider is more in scenario S. In addition, since max-min fair achieves higher fairness index than weighted fair, max-min fair maintains a higher CDF curve than weighted fair in scenario S 2 under both interval 3 and interval Payment of application providers A more important performance metric in application provider s behavior is the payment. Fig. detailed de-
11 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 scribed the payment of application providers in a 96-interval period of time, where Fig. (a) first plots the average payment across all application providers in each time interval. It is clear that bandwidth reservation algorithms in scenario S always achieve higher payment than that in S 2. This is mainly because that application providers in S gets more bandwidth than that in S 2. We can further observe that maxmin fair maintains a lower payment than weighted fair in both scenario S and S 2. This can be easily reasoned about by that max-min fair algorithm reserves bandwidth from idaas providers in the increasing order of the relative per unit bandwidth price. To understand the difference between each application provider s payments, we plot the standard deviation of application providers payments in Fig. (b). Clearly, S 2 always maintain a lower standard deviation of payment for both max-min fair and weighted fair reservation algorithms than S. We further observe that max-min fair reservation algorithm achieves higher standard deviation of payment in S, while it is opposite in scenario S 2. The root cause is that the size of bandwidth that each application provider reserve is scaling down in equal ratio based on the relative demand. Finally, we plot the CDF of the payment under two sampled intervals 3 and 7 to study the distribution of application provider payment, which are shown in Fig. (c) and Fig. (d), respectively. Clearly, both max-min and weighted reservation algorithms in scenario S 2 achieve higher CDF curve of the payment than that in S 2 under both interval 3 and 7. In addition, payment of a same portion of application providers for weighted fair reservation algorithm is higher than that for max-min fair reservation algorithm in S 2 since a little higher CDF curve is maintained by weighted fair algorithm. We further observe that maxmin fair reservation algorithm maintains a little higher CDF curve of payment than weighted fair reservation algorithm in scenario S under both interval 3 and 7. These results are mainly caused by that max-min fair reservation strategy starts with filling each application provider s demand in the increasing order of the relative per unit bandwidth price, which is different to the weighted fair reservation strategy. 6 RELATED WORK In this section, we will present related work in cloud bandwidth reservation and bandwidth price, as these are most closely related to our work in this paper. Recently, there are many researches on reserving cloud bandwidth, which makes offering bandwidth guarantees to application provider s wide area traffic become technically feasible. To provider bandwidth guarantee for such traffic, both intradatacenter bandwidth and the WAN bandwidth should be reserved. Actually, many proposals have been proposed on datacenter engineering to offer bandwidth guarantees for VM-pairs [2], flows [22], or applications [23]. Moreover, advances on inter-datacenter network also make the bandwidth reservation feasible, i.e., Google B4 [4], which can open a tunnel with guaranteed WAN bandwidth for each flow. These proposals have made private WANs more attractive to application providers that have large amount of wide area traffic. Currently, wide area traffic is mainly priced based on a usage-based pricing policy [7], which is however unable to price the bandwidth guarantees. Niu et.al focus on pricing cloud bandwidth reservations such that the social welfare is maximized, even with the presence of demand uncertainty [24]. Their another work [25] further proposes a theory of pricing cloud bandwidth for video-on-demand providers who move their video streaming services to cloud. Our work in this paper differs markedly from these works above since they mainly concentrate on the intra-datacenter bandwidth. Our focus is to price the bandwidth guarantees in the new type of service inter-datacenter network as a service, where application providers make wide area transit bandwidth reservations from idaas providers to support their wide area traffic. 7 CONCLUSION Motivated by the enormous and fast growing wide area traffic in large-scale Internet applications, we propose a new type of service inter-datacenter network as a service, for Internet giants like Google and Facebook that host large-scale private WANs between their geographically distributed datacenters. We demonstrate the feasibility and reveal the potential benefits of such new service. Specifically, we consider a bandwidth trading market of multiple idaas providers and multiple application providers, where application providers make bandwidth reservation for bandwidth guarantees from idaas providers to support their wide area traffic. We focus on the essential bandwidth pricing problem. Furthermore, we apply a two-stage Stackelberg game to model the interaction between idaas providers and application providers, where both idaas providers themselves are playing a Nash bargaining game while application providers plays a noncooperative game. Following comprehensively analysis, we prove the existence and uniqueness of the Nash equilibrium for the application provider s game. We further make efforts to compute the bandwidth price by blending the advantage of a geometric Nash bargaining solution and demand segmentation method. Based on the pre-computed price, we propose two bandwidth reservation algorithms. Finally, we conduct real-world traces to evaluate the proposed algorithms. The evaluation results demonstrate that our algorithms are capable of benefiting both idaas providers and application providers. APPENDIX A PROOF OF THEOREM Let G j (x i,j, x i ) be the first-order derivative of U j (x i,j, x i ) with respect to x i,j. We can take the first order derivative of G j (x i,j, x i ) with respect to x i,j as follow G j (x i,j, x i ) x i,j = x i,j 2 P i (x i ) 2 x i,j 2 P i(x i ) x i,j = A ib i C i e Bixi (A i e Bixi (2 B i x i,j ) B i x i,j ) ( + A i e Bixi ) 3 (5) Based on the guidelines of [26], a Nash equilibrium exists when U j (x i,j, x i ) is continuous in x i and concave in x i,j. Obviously, R j (x i,j, x i ) is continuous in x i. We only need
12 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 2 to prove that U j (x i,j, x i ) is concave in x i,j. This means that Gj(xi,j,xi) x i,j <. Since A i, B i, C i are positive values and A i >. Then, to maintain the concavity of U j (x i,j, x i ), the following equation should be satisfied A i e B ix i (2 B i x i,j ) B i x i,j ) < = x i,j > 2A ie Bixi + 2 = 4 (2 + A i B i e Bixi B i B i A i e Bixi ) (6) So, U j (x i,j, x i ) is concave in x i,j and the existence of the Nash equilibrium is thus proved. Having settled the question of existence of the NE, we now establish the uniqueness of the NE. To this end, we first need to understand the monotonicity of G j (x i,j, x i ). Clearly, G j (x i,j, x i ) is decreasing in x i,j since its secondorder derivative is less than, which has been proved above. Similar to the proof of G j (x i,j, x i ) monotonicity in x i,j, we find that G j (x i,j, x i ) is also decreasing in x i by Eq. (7). Now, let x and ˆx be two NEs. By applying Kuhn-Tracker conditions, we have { = λj if ˆx i,j >, G j (ˆx i,j, ˆx i ) (7) < λ j if ˆx i,j =, and G j (x i,j, x i ) { = ˆλj if x i,j >, < ˆλ j if x i,j =. (8) where λ j and ˆλ j are the corresponding Lagrange multipliers. Now we need to prove that x=ˆx, i.e., for every i, j, x i,j =ˆx i,j. To this end, we first prove that for each i and j, the following relations hold: {ˆλ j λ j, ˆx i x i } ˆx i,j x i,j, (9) {ˆλ j λ j, ˆx i x i } ˆx i,j x i,j. (2) We only prove Eq. (9), since Eq. (2) is symmetric. Note that Eq. (9) holds trivially if ˆx i,j =. Otherwise, we have the following equation by applying that G j (x i,j, x i ) is decreasing in both x i,j and x i, G j (ˆx i,j, ˆx i ) = ˆλ j λ j G j (x i,j, x i ) G j (x i,j, ˆx i ). (2) Since G j (x i,j, x i ) is decreasing in x i,j, we have ˆx i,j x i.j. For symmetric reason, we can also obtain ˆx i,j x i.j. Now, we let N ={i : ˆx i >x i } and M ={j : ˆλj <λ j }, such that N 2 =N N ={i : ˆx i x i }. Assume that N is nonempty. Recalling that i ˆx i,j= i x i,j=d j, it follows by Eq. (2) that for each j in M, ˆx i,j = d j ˆx i,j i N i N 2 d j (22) x i,j = x i,j. i N 2 i N Note that Eq. (9) implies that ˆx i,j x i,j for each i N and j M. So, we can now get that ˆx i = ˆx i,j i N j M i N (23) x i,j = x i. j M i N i N This inequality significantly contradicts the definition of N, which implies that N is an empty set. By symmetry, it also can be concluded that the set {i : ˆx i <x i } is empty. This implies that ˆx i = x i, for every i N. (24) We now proceed to show that ˆλ j =λ j for each application provider j. To this end, note that Eq. (9) may be strengthened as follow {ˆλ j > λ j,ˆx i = x i } implies that either ˆx i,j < x i,j, or ˆx i,j = x i,j =. (25) Indeed, if ˆx i,j =, then the implication is trivial. Otherwise, if ˆx i,j >, it follows similarly to Eq. (2) that G j (ˆx i,j, ˆx i )>G j (x i,j, ˆx i ), so that ˆx i,j <x i,j as required. Suppose that ˆλj >λ j for some j M. Since i N ˆx i,j=d j Eq. (2) implies that >, then ˆx i,j > for at least one i and i N x i,j > i N ˆx i,j = d j, (26) which contradicts the demand constraint for application provider j. Therefore, we conclude that ˆλ j >λ j does not hold for any application provider j. A symmetric argument may be used to show that ˆλ j <λ j can not hold as well. Thus, ˆλ j =λ j for every application provider j M. Combined with Eq. (24), this implies that by Eq. (9) and Eq. (2) that ˆx i,j =x i,j for each i, j, and the uniqueness of the NE is thus proved. APPENDIX B PROOF OF THEOREM 2 Recall that we split the total bandwidth demand into K pieces, where K is a number of infinity. Therefore, when determining the pivot location by equally dividing the sum utility-distance product towards all players, the mean utility-distance product relative to player i can actually obtained by finding its limit value associated K. μ i = N lim = N lim = N lim K φ i,k K k= K K k= K K k= = N lim K = N C i= r k (L i + i +A i e B i r ) k D i= K (L C i+ i +A i e B i K D ) i= K D K (L C i+ i +A i e B i K D ) i= D(L i+ C i +A ) i. (27) In the ideal condition, each idaas provider can actually get a portion of the total demand. This means that each idaas provider can get some sub-commodities in K. Let <
13 JOURNAL OF L A T E X CLASS FILES, VOL. 3, NO. 9, SEPTEMBER 24 3 ħ i < denote the portion that idaas provider i obtains from sub-commodities set K, such that the number of subcommodities that occupied by idaas provider i is ħ i K. The cumulative utility-distance product on idaas provider i s side can be calculated as lim K k= ħ ik φ i,k = lim ħ ik K k= = lim K ħ ik = ħ i D i= K (L C i+ i +A i e B i K D ) i= D(L i + C i +A ) i D i= K (L C i+ i +A i e B i K D ) (28) Since the cumulative utility-distance product of one idaas provider is no larger than its mean utility-distance product, such that by applying the Nash bargaining solution in the multi-player geometrical game, we have ħ i i= D(L i + C i +A ) i = N = ħ i = N. i= D(L i + C i +A ) i (29) Finally, by adding up all the demands that each idaas provider occupies, we have x i = ħ i Kr k = N K D K = D N. (3) Since the total demand received by an idaas provider must be constrained by its bandwidth capacity v i. Hence, x i should be the minimum value between the bandwidth capacity v i and D N. Proved. ACKNOWLEDGMENT This work is supported by the National Science Foundation for Distinguished Young Scholars of China (Grant No. 6225); NSFC under Grant nos. of 6736, 6736, and 67362; Project funded by China Postdoctoral Science Foundation (Grant No. 23M5396), the Fundamental Research Funds for the Central Universities (Grant No.DUT3ZD and DUT3JS4). REFERENCES [] V. K. Adhikari, Y. Guo, F. Hao, M. Varvello, V. Hilt, M. Steiner, and Z.-L. Zhang, Unreeling netflix: Understanding and improving multi-cdn movie delivery, in Proceedings of IEEE INFOCOM, 22, pp [2] Y. Chen, S. Jain, V. K. Adhikari, Z.-L. Zhang, and K. Xu, A first look at inter-data center traffic characteristics via yahoo! datasets, in Proceedings of IEEE INFOCOM, Shanghai, China, 2. [3] Forrester research, /Y26. [4] S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu et al., B4: Experience with a globally-deployed software defined wan, in Proceedings of ACM SIGCOMM, Hong Kong, 23. [5] J. Roberts, The cloud is the future Internet: how can we enginneer a cloud, IEEE INFOCOM Keynote, 23. [6] P. Gill, M. F. Arlitt, Z. Li, and A. Mahanti, The flattening internet topology: Natural evolution, unsightly barnacles or contrived collapse? in Proceedings of Springer PAM, Cleveland, OH, USA, 28. [7] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., A view of cloud computing, Communications of the ACM, vol. 53, no. 4, pp. 5 58, 2. [8] E. Altman, T. Basar, T. Jiménez, and N. Shimkin, Competitive routing in networks with polynomial costs, IEEE Transaction on Automic Control, vol. 47, no., pp , 22. [9] D. Fudenberg and J. Tirole, Game Theory. The MIT Press, 99. [] Y. Feng, B. Li, and B. Li, Bargaining towards maximized resource utilization in video streaming datacenters, in Proceedings of IEEE INFOCOM, 22, pp [] K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall, Improving the reliability of internet paths with one-hop source routing, in Proceedings of USENIX OSDI, San Francisco, California, USA, 24. [2] S. Sundaresan, W. d. Donato, N. Feamster, R. Teixeira, S. Crawford, and A. Pescapè, Broadband internet performance: a view from the gateway, in Proceedings of ACM SIGCOMM, Toronto, ON, Canada, 2. [3] T. Benson, A. Akella, and D. A. Maltz, Network traffc characteristics of data centers in the wild, in Proceedings of ACM IMC, Melbourne, Australia, 2. [4] Yahoo! research webscope program, organization/academic-relations. [5] Zimory cloud computing, [6] W. B. Norton, Drpeering.net, [7] T. Basar and G. J. Olsder, Dynamic noncooperative game theory. SIAM Series in Classics in Applied Mathematics, 999. [8] J. Guo, F. Liu, D. Zeng, J. Lui, and H. Jin, A cooperative game based allocation for sharing data center networks, in Proceedings of IEEE INFOCOM, Turin, Italy, 23. [9] L. Chiaraviglio, M. Mellia, and N. Fabio, Minimizing isp network energy cost: formulation and solutions, IEEE/ACM Transactions on Networking, vol. 2, no. 2, pp , Arpil 22. [2] R. Jain, D.-M. Chiu, and W. R. Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer system. Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA, 984. [2] L. Popa, G. Kumar, M. Chowdhury, A. Krishnamurthy, S. Ratnasamy, and I. Stoica, Faircloud: sharing the network in cloud computing, in Proceedings of ACM SIGCOMM, Helsinki, Finland, 22. [22] A. Shieh, S. Kandula, A. Greenberg, C. Kim, and B. Saha, Sharing the data center network, in Proceedings of USENIX NSDI, Boston, America, 2. [23] L. Chen, Y. Feng, B. Li, and B. Li, Towards performance-centric fairness in datacenter networks, in Proceedings of IEEE INFOCOM, Toronto, Canada, 24. [24] D. Niu, C. Feng, and B. Li, Pricing cloud bandwidth reservations under demand uncertainty, in Proceedings of ACM SIGMETRIC, London, England, 22. [25], A theory of cloud bandwidth pricing for video-on-demand providers, in Proceedings of IEEE INFOCOM, Orlando, Florida, 22. [26] J. Rosen, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, vol. 33, no. 3, pp , 965.
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Network-Wide Change Management Visibility with Route Analytics
Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application
Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS
Sensitivity Analysis 3 We have already been introduced to sensitivity analysis in Chapter via the geometry of a simple example. We saw that the values of the decision variables and those of the slack and
An introduction to Value-at-Risk Learning Curve September 2003
An introduction to Value-at-Risk Learning Curve September 2003 Value-at-Risk The introduction of Value-at-Risk (VaR) as an accepted methodology for quantifying market risk is part of the evolution of risk
The big data revolution
The big data revolution Friso van Vollenhoven (Xebia) Enterprise NoSQL Recently, there has been a lot of buzz about the NoSQL movement, a collection of related technologies mostly concerned with storing
Capital Structure. Itay Goldstein. Wharton School, University of Pennsylvania
Capital Structure Itay Goldstein Wharton School, University of Pennsylvania 1 Debt and Equity There are two main types of financing: debt and equity. Consider a two-period world with dates 0 and 1. At
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
Duality in Linear Programming
Duality in Linear Programming 4 In the preceding chapter on sensitivity analysis, we saw that the shadow-price interpretation of the optimal simplex multipliers is a very useful concept. First, these shadow
Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
Math 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
Capacity Planning. The purpose of capacity planning is to:
The purpose of capacity planning is to: Determine Current Solution Capacity: How close to the ceiling am I today? Estimate Growth Potential: With current growth plans, when do I upgrade hardware? Answer
The Basics of Game Theory
Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #7 The Basics of Game Theory Friday - November 5, 2004 OUTLINE OF TODAY S RECITATION 1. Game theory definitions:
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Linear Programming. Solving LP Models Using MS Excel, 18
SUPPLEMENT TO CHAPTER SIX Linear Programming SUPPLEMENT OUTLINE Introduction, 2 Linear Programming Models, 2 Model Formulation, 4 Graphical Linear Programming, 5 Outline of Graphical Procedure, 5 Plotting
Systems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
The Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
Lab Testing Summary Report
Lab Testing Summary Report July 2006 Report 060725 Product Category: WAN Optimization Appliances Vendors Tested: Citrix Systems TM Riverbed Technology TM Key findings and conclusions: The WANScaler 8800
A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method
Send Orders for Reprints to [email protected] 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy
BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.
Verifying Network Bandwidth
Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific
Network Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
Arrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
25 Integers: Addition and Subtraction
25 Integers: Addition and Subtraction Whole numbers and their operations were developed as a direct result of people s need to count. But nowadays many quantitative needs aside from counting require numbers
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
The Basics of FEA Procedure
CHAPTER 2 The Basics of FEA Procedure 2.1 Introduction This chapter discusses the spring element, especially for the purpose of introducing various concepts involved in use of the FEA technique. A spring
Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems
215 IEEE International Conference on Big Data (Big Data) Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems Guoxin Liu and Haiying Shen and Haoyu Wang Department of Electrical
5/31/2013. 6.1 Normal Distributions. Normal Distributions. Chapter 6. Distribution. The Normal Distribution. Outline. Objectives.
The Normal Distribution C H 6A P T E R The Normal Distribution Outline 6 1 6 2 Applications of the Normal Distribution 6 3 The Central Limit Theorem 6 4 The Normal Approximation to the Binomial Distribution
Example 1. Consider the following two portfolios: 2. Buy one c(s(t), 20, τ, r) and sell one c(s(t), 10, τ, r).
Chapter 4 Put-Call Parity 1 Bull and Bear Financial analysts use words such as bull and bear to describe the trend in stock markets. Generally speaking, a bull market is characterized by rising prices.
14.1 Rent-or-buy problem
CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms
Supervised and unsupervised learning - 1
Chapter 3 Supervised and unsupervised learning - 1 3.1 Introduction The science of learning plays a key role in the field of statistics, data mining, artificial intelligence, intersecting with areas in
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Reflection and Refraction
Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,
1 Nonzero sum games and Nash equilibria
princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Descriptive statistics Statistical inference statistical inference, statistical induction and inferential statistics
Descriptive statistics is the discipline of quantitatively describing the main features of a collection of data. Descriptive statistics are distinguished from inferential statistics (or inductive statistics),
Oligopoly and Strategic Pricing
R.E.Marks 1998 Oligopoly 1 R.E.Marks 1998 Oligopoly Oligopoly and Strategic Pricing In this section we consider how firms compete when there are few sellers an oligopolistic market (from the Greek). Small
Simple Channel-Change Games for Spectrum- Agile Wireless Networks
Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented
Means, standard deviations and. and standard errors
CHAPTER 4 Means, standard deviations and standard errors 4.1 Introduction Change of units 4.2 Mean, median and mode Coefficient of variation 4.3 Measures of variation 4.4 Calculating the mean and standard
Video Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
6.4 Normal Distribution
Contents 6.4 Normal Distribution....................... 381 6.4.1 Characteristics of the Normal Distribution....... 381 6.4.2 The Standardized Normal Distribution......... 385 6.4.3 Meaning of Areas under
CALCULATIONS & STATISTICS
CALCULATIONS & STATISTICS CALCULATION OF SCORES Conversion of 1-5 scale to 0-100 scores When you look at your report, you will notice that the scores are reported on a 0-100 scale, even though respondents
Optimal batch scheduling in DVB-S2 satellite networks
Optimal batch scheduling in DVB-S2 satellite networks G. T. Peeters B. Van Houdt and C. Blondia University of Antwerp Department of Mathematics and Computer Science Performance Analysis of Telecommunication
Real Roots of Univariate Polynomials with Real Coefficients
Real Roots of Univariate Polynomials with Real Coefficients mostly written by Christina Hewitt March 22, 2012 1 Introduction Polynomial equations are used throughout mathematics. When solving polynomials
IP Network Control: Turning an Art into a Science. Case Study: Global Crossing
Case Study: Global Crossing IP Network Control: Turning an Art into a Science Company: Industry: Global Crossing Holdings Ltd. Telecommunications Challenge(s): Global Crossing want the visibility and control
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
What is Linear Programming?
Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Linear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
Article from: Risk Management. June 2009 Issue 16
Article from: Risk Management June 2009 Issue 16 CHAIRSPERSON S Risk quantification CORNER Structural Credit Risk Modeling: Merton and Beyond By Yu Wang The past two years have seen global financial markets
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
The Cobb-Douglas Production Function
171 10 The Cobb-Douglas Production Function This chapter describes in detail the most famous of all production functions used to represent production processes both in and out of agriculture. First used
Normal distribution. ) 2 /2σ. 2π σ
Normal distribution The normal distribution is the most widely known and used of all distributions. Because the normal distribution approximates many natural phenomena so well, it has developed into a
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Vector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages
0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text)
September 2 Exercises: Problem 2 (p. 21) Efficiency: p. 28-29: 1, 4, 5, 6 0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text) We discuss here a notion of efficiency that is rooted in the individual preferences
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Expert Reference Series of White Papers. Basics of IP Address Subnetting
Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction
Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm
Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker [email protected] ComNets, TZI, University Bremen, Germany
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Virtual Landmarks for the Internet
Virtual Landmarks for the Internet Liying Tang Mark Crovella Boston University Computer Science Internet Distance Matters! Useful for configuring Content delivery networks Peer to peer applications Multiuser
Monetary Policy Bank of Canada
Bank of Canada The objective of monetary policy may be gleaned from to preamble to the Bank of Canada Act of 1935 which says, regulate credit and currency in the best interests of the economic life of
Texas Christian University. Department of Economics. Working Paper Series. Modeling Interest Rate Parity: A System Dynamics Approach
Texas Christian University Department of Economics Working Paper Series Modeling Interest Rate Parity: A System Dynamics Approach John T. Harvey Department of Economics Texas Christian University Working
Daily vs. monthly rebalanced leveraged funds
Daily vs. monthly rebalanced leveraged funds William Trainor Jr. East Tennessee State University ABSTRACT Leveraged funds have become increasingly popular over the last 5 years. In the ETF market, there
Games of Incomplete Information
Games of Incomplete Information Jonathan Levin February 00 Introduction We now start to explore models of incomplete information. Informally, a game of incomplete information is a game where the players
Demand, Supply, and Market Equilibrium
3 Demand, Supply, and Market Equilibrium The price of vanilla is bouncing. A kilogram (2.2 pounds) of vanilla beans sold for $50 in 2000, but by 2003 the price had risen to $500 per kilogram. The price
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
Peering Analysis: GenieATM 6000 July 2013
Application Note Peering Analysis: July 2013 1. Application background As the internet activity is expected to expand continuously, ISPs across the globe are looking for ways to optimize their operations
Fixed Point Theorems
Fixed Point Theorems Definition: Let X be a set and let T : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation
4. Continuous Random Variables, the Pareto and Normal Distributions
4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random
Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.
Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.
The Ultimate WISP Customer Experience. A White Paper by Leon Hubby Co-Founder, Mesh Networks
The Ultimate WISP Customer Experience A White Paper by Leon Hubby Co-Founder, Mesh Networks Contents Introduction... 3 At Issue The Problem... 3 Current Protocol- Not a Solution... 3 Exceeding Expectations-
Special Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
NOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
A New Nature-inspired Algorithm for Load Balancing
A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of
Review of Fundamental Mathematics
Review of Fundamental Mathematics As explained in the Preface and in Chapter 1 of your textbook, managerial economics applies microeconomic theory to business decision making. The decision-making tools
Chapter 7 Monopoly, Oligopoly and Strategy
Chapter 7 Monopoly, Oligopoly and Strategy After reading Chapter 7, MONOPOLY, OLIGOPOLY AND STRATEGY, you should be able to: Define the characteristics of Monopoly and Oligopoly, and explain why the are
Cooperative Caching with Return on Investment
Cooperative Caching with Return on Investment Gala Yadgar Computer Science Department, Technion Haifa, Israel Email: [email protected] Michael Factor IBM Research Haifa, Israel Email: [email protected]
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
Overview of recent changes in the IP interconnection ecosystem
Presentation for Broadband for America Overview of recent changes in the IP interconnection ecosystem Michael Kende June 7 th, 2011 Ref: Introduction 2 Last year marked the 15 th anniversary of the commercialization
