Agents Bidding Strategies in a Combinatorial Auction Controlled Grid Environment



Similar documents
Combinatorial Auctions for Transportation Service Procurement: The Carrier Perspective

Service Oriented Grid: A Vision for the Financial Industry

Online Combinatorial Double Auction for Mobile Cloud Computing Markets

On the Interaction and Competition among Internet Service Providers

Collaboration for Truckload Carriers

Collaborative Transportation Planning of Less-Than-Truckload Freight: Request Exchange through a Route-based Combinatorial Auction

State of the German Market - Year 2006

Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints

Proximal mapping via network optimization

2004 Networks UK Publishers. Reprinted with permission.

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm

INTEGRATED OPTIMIZATION OF SAFETY STOCK

An Expressive Auction Design for Online Display Advertising. AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock

Optimization Heuristics for the Combinatorial Auction Problem

Integrated Modeling of Business Value and Software Processes

Group D: FAA Landing Slots. Elaine Ou Jeff Shneidman Allan Sumiyama

A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications

Permutation Betting Markets: Singleton Betting with Extra Information

An Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution

Solving the Vehicle Routing Problem with Multiple Trips by Adaptive Memory Programming

ANNEX 1 TASK DESCRIPTION Regarding consulting services and auction software in connection with the 1800 MHz auction

24. The Branch and Bound Method

An Autonomous Agent for Supply Chain Management

Role of Stochastic Optimization in Revenue Management. Huseyin Topaloglu School of Operations Research and Information Engineering Cornell University

Simulation for Business Value and Software Process/Product Tradeoff Decisions

CHAPTER 1 INTRODUCTION

Linear Programming Sensitivity Analysis

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Collaborative transportation planning of less-than-truckload freight

Maximizing Liquidity in Cloud Markets through Standardization of Computational Resources

Optimal Rate Allocation in Overlay Content Distribution

Permutation Betting Markets: Singleton Betting with Extra Information

An optimisation framework for determination of capacity in railway networks

A Tool for Generating Partition Schedules of Multiprocessor Systems

Randomization Approaches for Network Revenue Management with Customer Choice Behavior

A dynamic auction for multi-object procurement under a hard budget constraint

Probabilistic Automated Bidding in Multiple Auctions

Network Infrastructure Services CS848 Project

Auction Market System in Electronic Security Trading Platform

Competitive Advantage

Active Queue Management (AQM) based Internet Congestion Control

High-performance local search for planning maintenance of EDF nuclear park

Distributed and Scalable QoS Optimization for Dynamic Web Service Composition

Load Balancing in Cellular Networks with User-in-the-loop: A Spatial Traffic Shaping Approach

Different types of electricity markets modelled using PLEXOS Integrated Energy Model The UK Balancing Market example

Automatic Stress and Load Testing for Embedded Systems

Bandwidth Trading: A Comparison of the Combinatorial and Multicommodity Approach

APPLYING HEURISTIC METHODS FOR JOB SCHEDULING IN STORAGE MARKETS

Revenue Maximization with Dynamic Auctions in IaaS Cloud Markets

How To Make A Simultaneous Auction

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS

An Overview Of Software For Convex Optimization. Brian Borchers Department of Mathematics New Mexico Tech Socorro, NM

Individual-based annual fee estimation and strategies for new and existing credit card holders

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling

IMPROVING RESOURCE LEVELING IN AGILE SOFTWARE DEVELOPMENT PROJECTS THROUGH AGENT-BASED APPROACH

Cyber-Security Analysis of State Estimators in Power Systems

RT Options Scanner. Introduction

Numerical methods for American options

On demand synchronization and load distribution for database grid-based Web applications

Integrating Benders decomposition within Constraint Programming

Cash in advance model

Chapter 7. Sealed-bid Auctions

Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs

A MULTI-PERIOD INVESTMENT SELECTION MODEL FOR STRATEGIC RAILWAY CAPACITY PLANNING

Data Communications Company (DCC) price control guidance: process and procedures

On studying business models in mobile social networks based on two-sided market. 06/04/2015 Hansol Kim

Algorithm Design and Analysis

Scheduling Algorithm with Optimization of Employee Satisfaction

Composing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods

An Expressive Auction Design for Online Display Advertising

Vickrey-Dutch Procurement Auction for Multiple Items

Optimal Scheduling for Dependent Details Processing Using MS Excel Solver

TABLE OF CONTENTS...1 INTRODUCTION...2 SYSTEM DESIGN...3 STRUCTURE OF AUCTION RULES...8 INTRODUCTION...8

A Reinforcement Learning Approach for Supply Chain Management

Strategic Procurement Services

Do you ever wonder? if I increase my Max CPC bid from $2 to $3, how many more clicks can I expect to get?

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

QLIKVIEW ARCHITECTURE AND SYSTEM RESOURCE USAGE

Industry Environment and Concepts for Forecasting 1

A numerically adaptive implementation of the simplex method

Business Rules for OR People: Methods for Process Automation. Gregory Glockner, Ph.D. ILOG, Inc.

Analyzing Distribution of Traffic Capacity

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Sourcing and Contracts Chapter 13

ICE Clear Credit Preparations for a Potential Clearing Participant Default

A Scalable Approach for QoS-based Web Service Selection

Pricing Transmission

Chapter Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Taking Advantage of Lower Electric Rates for your Government Agency

Linear Programming Notes V Problem Transformations

Introduction to Natural Computation. Lecture 15. Fruitflies for Frequency Assignment. Alberto Moraglio

Support Vector Machines Explained

Lecture 11: Sponsored search

Transcription:

gents Bidding Strategies in a Combinatorial uction Controlled Grid Environment Michael Schwind, Tim Stockheim, and Oleg Gujo Institute of Information Systems, University of Frankfurt, Germany schwind,stockheim,gujo@is-frankfurt.de 1 Simulation Setting We present an agent-based simulation environment for resource allocation in a distributed computer system that employs a combinatorial task scheduler. Our environment enables the simulation of a mechanism for the simultaneous allocation of resources like CPU time (CPU), communication bandwidth (NET), volatile (MEM) and non-volatile memory (DSK) in the distributed computer system. In contrast to traditional grid allocation approaches, our allocation process considers production complementarities and substitutionalities for these resources making the resulting resource usage much more efficient. The central scheduling instance of our system is comparable to an auctioneer that performs an iterative combinatorial auction (C). Proxy-agents try to acquire the resources needed in computational tasks for the provisioning of information services and information production (ISIP) by submitting package bids for the resource combinations. The system simulates a closed loop grid economy in which the agents gain monetary units for resources they provide to other grid system participants. The simulation environment allows the utilization and benchmarking of different proxy-bidding strategies in various system load situations. For the comparison of the bidding strategies we introduce a utility function that allows to represent different preferences of agents. 1.1 Scenario for a PCR in a Combinatorial Grid Scheduler The general price controlled resource allocation (PCR) scenario used within the combinatorial grid simulator is constructed as follows: Task agents are engaged in acquiring the resources needed to process the ISIP task in the distributed computer system on behalf of real world clients. They do this by bidding for the required resource combination via the mediating agent. mediating agent (auctioneer) receives the resource bids and calculates an allocation profile for the available resources managed by the resource agents according to the allocation mechanism. Resource agents manage available resources on their particular host IT systems and offer them to the task agents via the mediating agent. If a bid is accepted via the auctioneer the acquired resources are reserved.

two-dimensional bid-matrix (BM) is used to represent the bids. One dimension of the BM describes the time t at which the resource is required within the request period. The other dimension r denotes the resource types MEM, CPU, NET, DSK. The request for a quantity of an individual resource r at time t is then denoted by a matrix element q i,j (r, t). price p i,j is assigned to each BM expressing the agent s willingness-to-pay (W2P) for the resource bundle. In both variables the indices i and j identify the bid matrix. The value q bmax denotes the maximum resource load that can be requested by a bidder for a single BM element q i,j (r, t). These elements are occupied with time slot occupation probability p tso and have a maximum allocable resource quantity q max (r, t) at time t. 1.2 The System s Budget Management Mechanism Each task agent holds a monetary budget that is initialized with a fixed amount BG ini of monetary units (MUs) when the negotiations begin. t the beginning of each round k, the task agents budgets are refreshed. In order to avoid an expiration of the agents budgets during the iterative auctioning process the agents are integrated into a monetary circuit in the closed-loop grid economy regarded in this work. Task and resource agents act as a unit of consumer and producer both owning the resources of their peer system. The resource agent does the reporting of resource usage and provisioning for the task agent. The agents on the peer computer are compensated for the resources provided to the system. The budget circulating in the system is kept constant for the closed grid economy. 1.3 The Combinatorial uctioneer The combinatorial auctioneer controls the iterative allocation process of the grid. For this purpose the auctioneer awaits the bids i that are submitted in the form of j XOR-bundled BM s and represent the task agents requested capacity q i,j (r, t) of the resources r at time t. fter having received all alternative BMs submitted by the task agents, the auctioneer has to solve the combinatorial auction problem (CP) which is NP-hard [1]. The CP is often denoted as the winner determination problem (WDP), according to the traditional auctioneers task of identifying the winner. The formal description of the CP is [2]: max I i=1 Ji j=1 p i,j x i,j (1) s. t. q(r, t) = I Ji q i,j(r, t) x i,j q max (r, t), i=1 j=1 r {1,...,R},t {1,...,T } and Ji x i,j 1, i {1,...,I}. j=1 (2)

The auctioneer s goal is to maximize the received income under the resource constraints. In order to accelerate the price-finding process, the auctioneer provides feedback information to the bidders to adjust their W2Ps p i,j. It is not always possible to calculate unambiguous prices for the individual resources in a C. 1 Kwasnica et al. describe a pricing scheme for the individual goods in a C by approximating the prices based on a LP approach [3]. Like in a similar approach by Bjørndal and Jørnsten they employ the dual solution of the relaxed WDP to calculate the shadow prices sp r,t [4]. In the simulation model presented here, the dual LP approach of Kwasnica et al. is adopted: s.t. R r=1 min z = R r=1 t=1 qmax (r, t) sp r,t (3) t=1 q i,j(r, t) sp r,t + (1 x i,j ) δ i,j = p i,j (4) Here δ i,j are called reduced cost. The proposed SP calculation uses LPSOLVE 5.5 to solve the LP problem in Eq. (4). The SPs are weighted by the resource usage and grouped to shadow prices for each resource. Now the market value of a resource unit v r can be calculated while using the shadow prices and summarizing the utilized capacity of each resource r for all accepted bids: v r = t=1 sp r,t q(r, t) t=1 q(r, t) r {1,...,R} (5) Bid prices are assumed to be non-linear in this framework. This means that shadow prices sp r,t can not be calculated in each round, i.e. there is no solution of the LP [4]. In such cases the auctioneer relies on an approximation of the market values ˆv r as the averaged market values calculated in the last n rounds. 1.4 The Task gents Bidding Model The task agents of the combinatorial simulation model try to acquire the resources needed for ISIP provision. Besides the market values of resources, the task agents bidding behavior is determined by their budget and by a bidding strategy. t each round k the task agents generate M new bids. The task agents submit several bids as exclusively eligible bundles (OR-of-XOR). If the budget of a task agent is exhausted due to the continued acceptance of bids by the auctioneer, no further bids are submitted until the budget has recovered. The task agents repeat bidding for rejected bids in the following round while modifying the W2P with respect to the current pricing information. Depending on the market value v r of the resources required for the ISIP provision process, task agents have to formulate their W2P for the bids. To calculate the bundle prices, two cases must be considered: 1 In many cases, explicit resource prices can only be calculated for each individual bid.

In the first round, a market value of the resources is not provided to the bidders. Therefore, bidder agents formulate the W2P for their initial bids by dividing the budget by L M J to calculate a mean bid price that guarantees the task agents budget to last for the next L rounds if M J new sets of XOR-bids are added. In the following rounds, the task agents employ the market values v r of the resources to determine their W2P. The requested amounts of capacity is multiplied by the according market value and if the bid is initialized, a factor p ini is included in the calculation so that initial bids may start below or above the current price level of the resource market. To control the price adaption process, an additional price acceleration factor p inc i is introduced. t each round, p inc is incremented by a constant p. p i,j (k) = R r=1 t=1 v r q i,j (r, t) p inc i (6) If a bid is rejected, the corresponding W2P is adapted by p inc i = p ini + (l i p), (7) resulting in the above mentioned value of p ini in round l i = 0. Recalculating the price based on the current market value v r results in a faster adoption process. Rejected bids are repeated with an updated W2P until the bid is accepted. Bids are discarded if they have not been accepted after L rounds. When an agent s budget is exhausted, it formulates no new bids until the budget is refreshed. 2 Testing Bidding Strategies In our simulations we try to find the utility maximizing strategy for the proposed agent types. While the amount of acquired ISIP resources has an positive impact but diminishing marginal impact on the agent s utility, the number of periods an agent waits until its bids are accepted has a negative impact. The utility U a of an agent is calculated by the following function with B a denoting the set of agent a accepted bids.: ( U a = x i,j R ) α T q i,j(r, t) l β a (8) (i,j) B a r=1 t=1 To calculate the decreasing impact of the waiting time, we use a time index l a (the averaged number of periods an agent bids until it has placed a successful bid) and β to adjust the force of the waiting time s impact. The impact of the quantity is defined by α. Using this utility function we introduce two agent types: quantity maximizer (α = 0.5, β = 0.01) that tries to acquire a high amount of resource capacity. The hypothesis is that this agent follows a smooth bidding strategy, i.e. he increases the bid prices slowly. The economic rationale for this type of proxy agent strategy can be the fact, that it bids for resources required for the fulfillment of an ISIP task that is not time-critical.

n impatient bidder (α = 0.5, β = 1.0) that suffers if he can not use the resources instantaneously and will use an aggressive bidding strategy. This agent has to submit high initial prices, but overpaying will reduce the quantity he can acquire. The economic motivation of this behavior can be a proxy agent that bids for the execution of time-critical tasks in an ISIP system. Beginning with three bundles containing three XOR bids in the first round, both agent types generated three additional bid bundles at each further round k. The task agents increase the W2P of rejected bids over a maximum of L = 5 rounds. The pattern of new generated bids is identical to the structured BM (q bmax = 3, p tso = 0.333, t max = 4). The auctioneer was able to allocate a maximum load of q max = 8 per resource while T = 8. The number of agents was set to 4 and the number of bids per agent (M) to 3. Three agents use a default bidding behavior with constant values of p = 0.2 and p ini = 0.5. The value of p has to be sufficient high to guarantee fast price adaptation in case of resource failures, while a high value of p ini leads to overpaying in case of low demand. Seite 1 Seite 1 Fig. 1. Mean acceptance time and quantity of resource units for test bidder with varying price increment p and initial price p ini. Fig. 1 shows the resource units acquired by the test agent and the averaged bid acceptance time l a of 50 simulation runs for each p, p ini combination (steps of 0.1). ll task agents receive the same budget in each round of the simulation. Fig. 1 illustrates that for small p and p ini the highest amount of resource units can be acquired by the task (test) agents. n aggressive strategy with high p and p ini leads to a declining amount of acquired resources. While a reduction of acceptance time is mainly achieved by high p ini, increasing p has only impact on average acceptance time if p ini is low. Fig. 2 depicts the utility resulting from varying price increment p and initial pricing p ini. In case of a quantity maximizing preference (β = 0.01) the test agent s utility is high for small initial bids and little price increments with a maximum utility value of U a = 53.36 at p ini = 0.5 and p = 0.1. It pays

0.1 0.5 Δ p 0.9 1.3 50 45 40 35 30 25 20 55 15 0.4 0.6 0.8 1 pini utility 0.1 0.5 Δ p 0.9 1.3 40 35 30 25 20 45 15 0.4 0.6 0.8 1 pini utility Fig. 2. Utility of the test bidder for quantity maximizing preference β = 0.01 (left) and impatient bidding behavior β = 1.0 (right) for determination of the optimal bidding strategy under varying price increment p and initial pricing behavior p ini. off for the patient bidder to wait if its bids fit into the current allocation at a relative low price (low increment and initial price). In contrary, the impatient bidder gains low utility from such a strategy (Fig. 2 right side). The impatient agent receives the highest utilities by using an initial bid price close to the market value of the resources (p ini = 0.9). Interestingly, the price increment in the following round does not have much impact on the acceptance time and therewith on the utility of the impatient test bidder. However, for bids exactly at market value utility declines sharply, signaling the peril of overbidding or simply paying too much for the required ISIP resources. This underlines the importance of accurate market value information to achieve good allocations. The shadow price controlled combinatorial grid enables agents to implement efficient bidding strategies according to the users utility functions. Of course a high impact of the competitors behavior remains as challenge. References 1. Parkes, D.C., Ungar, L.H.: Iterative combinatorial auctions: Theory and practice. In: Proceedings of the 17th National Conference on rtificial Intelligence (I- 00). (2000) 74 81 2. Vries, S.D., Vohra, R.: Combinatorial auctions: survey. INFORMS Journal on Computing 15(3) (2001) 284 309 3. Kwasnica,.M., Ledyard, J., Porter, D., DeMartini, C.: new and improved design for multi-objective iterative auctions. Management Science 51(3) (2005) 419 434 4. Bjørndal, M., Jørnsten, K.: n analysis of a combinatorial auction. Technical Report 2001-11, Department of Finance and Management Science, Norwegian School of Economics and Business dministration, Bergen, Norway (2001)