Elsevier

Journal of Systems Architecture

Volume 54, Issues 1–2, January–February 2008, Pages 81-96
Journal of Systems Architecture

Nash equilibria in bandwidth allocation for non-cooperative peer-to-peer networks

https://doi.org/10.1016/j.sysarc.2007.04.001Get rights and content

Abstract

In peer-to-peer networks, peers act as clients and servers, i.e., they can download files from others and allow others to download from them, at the same time. Since the bandwidth of a peer acting as server is shared among all its clients, the download rate experienced by a peer depends on the server choices of the other peers.

We focus our investigation on the bandwidth allocation among the peers and model this system with non-cooperative game theory. We assume that peers are rational players that maximize their utility, corresponding to minimize their download time. We study the existence of Nash equilibrium points under a very simple server selection policy and show that it is efficiency from the point of view of the bandwidth utilization.

Introduction

In the last years, peer-to-peer (P2P) applications have obtained an unexpected success in the Internet users’ community. The novelty of P2P paradigm relies on the two main concepts: cooperation among users and sharing of network resources. Users of the same P2P community provide services to the other users, while obtaining services from the community; in other words, each user (called peer) acts at the same time as client and server. This paradigm has been shown to provide many beneficial effects on the global system performances as: higher service capacity, reliability and flexibility [1].

Performance of P2P systems are influenced by many aspects. If we focus on the point of view of a user, two aspects are important: availability of the searched contents and the latency experienced before the content is available locally at the user. The availability of some particular content depends not only on its popularity and diffusion among the other peers, but also on the level of contribution of each peer with that content available. Because of the voluntary (and often free) joining to a P2P network, many users tend just to exploit the shared resources without any contribution: this behavior is called “free-riding” and is prevalent in many P2P communities, as pointed out in [2]. Given that the wanted content is available uncorrupted at some peers, the user experiences the latency between the time he starts to search a content and the time the content is available locally. This latency depends mainly on (i) the time required to find the peer who owns the content (search phase), (ii) the time to download the content (download phase), (iii) the dynamical behavior of the peers who can disconnect from the community at any time and abort all the services provided to the network.

Among all these aspects, we focus our investigation only on the download time, because of its time scale is much larger than the search time and at the same time, it is not related to the user behavior (which is difficult to model). The download time depends on the bandwidth available from the source to the peer; the bandwidth depends mainly on the packet network topology, the network congestion and on the transport protocol considered: in our case, TCP/IP. We essentially model the dynamics driven by the user selfishness who wants to minimize the download latency by choosing (and also changing in real-time) the source with the highest rate available. In this content, we are interested in understanding whether the overall system converges to some equilibrium and how efficient this equilibrium is.

In our investigation we neglect the search phase, which depends on the particular implementation of the P2P network and its effects on the performance are independent from the download phase. Hence, we initially assume that any content searched by a peer is available in any other peer, even if we will relax this assumption later on. In our model we neglect also the dynamical behavior of the peers, independent from the bandwidth allocation under study. We also assume that all the peers are cooperating and always provide the content requested, thanks to some cooperation mechanism present in the network.

Section snippets

System model

We describe all the assumptions present in our model: most of the simplifications are derived by other works on the same topic, as discussed in Section 2.2.

We consider a population of N peers, represented by the set {1,  ,N}. Each user runs a very simple peer selection mechanism, which can be implemented easily in a distributed way: anytime a peer wants some content (which is assumed, for now, available at every other peer), he sends a request to one of the other N  1 peers chosen with a uniform

Homogenous access networks

We start with the simpler case of an access network with homogenous bandwidth among all the peers, i.e., all the available upload bandwidths are the same (ri = r) and all the available download bandwidths are the same (di = d), for all i. This scenario will be generalized in Section 4.

We now assume that the available upload bandwidth cannot be larger than the available download bandwidth, i.e., r  d; this is a realistic assumption for all the access technologies that are symmetric or asymmetric (as

Inhomogeneous access networks

We extend our investigation to networks in which the access links have different bandwidths for each peer. This is an example of networks connecting peers using different access technologies.

In this scenario, analytical results are more difficult to obtain. The main reason is that, when a peer downloads from another, the effective download rate depends, according to Eq. (1), also from the available download bandwidth, which can be smaller than the available upload bandwidth of other peer in the

Conclusions

We considered a bandwidth allocation problem in a P2P system, in which each peer selects another peer to download a particular content and the bandwidth is shared among all the downloaders. We modeled the system as a simultaneous game in which each peer acts as player oblivious of the other peers’ choices; we assume that each peer plays as a selfish, rational user and tries to maximize its utility, i.e., the download rate he is receiving. Depending on the fact that the network is homogenous or

Krisztina Lója received the B.Sc. and M.Sc. degrees in mathematics from Budapest University of Technology and Economics (BUTE) in 2002. Currently she is working towards the Ph.D. degree in informatics at the Department of Telecommunication and Media Informatics at the BUTE. Her research interests include non-cooperative game theory and its applications in telecommunications especially in inter-domain routing, intra-domain routing and peer-to-peer networks.

References (22)

  • D. Manini, R. Gaeta, M. Sereno, Performance modeling of P2P file sharing applications, in: IEEE Workshop on Techniques,...
  • E. Adar et al.

    Free riding on Gnutella

    First Monday

    (2000)
  • M. Feldman, K. Lai, J. Chuang, I. Stoica, Quantifying disincentives in peer-to-peer networks, in: 1st Workshop on...
  • eMule, Help on connection settings, <http://www.emule-project.net/>, December...
  • P. Marbach, Priority Service and Max-Min Fairness, in: IEEE INFOCOM’02, June...
  • M. Feldman et al.

    Free-riding and whitewashing in peer-to-peer systems

    IEEE JSAC

    (2006)
  • C. Courcoubetis et al.

    Incentives for large peer-to-peer systems

    IEEE JSAC

    (2006)
  • C. Buragohain, D. Agrawal, S. Suri, A game theoretic framework for incentives in P2P systems, in: Peer-to-Peer...
  • M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in: ACM E-Commerce...
  • K. Ranganathan, M. Ripeanu, A. Sarin, I. Foster, To share or not to share: an analysis of incentives to contribute in...
  • M. Meo, F. Milan, A rational model for service rate allocation in peer-to-peer networks, in: Global Internet Symposium...
  • Cited by (4)

    • A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks

      2012, Computer Science Review
      Citation Excerpt :

      Most of the current P2P systems assume equal participation and that all peers are willing to contribute their resources. Such selfish peers frequently access and use the available shared resources but are not so forthcoming with sharing their own resources [29]. The risks associated with P2P unsolicited messaging, the speed with which they spread and the extent of potential damages are staggering, and increasing exponentially.

    Krisztina Lója received the B.Sc. and M.Sc. degrees in mathematics from Budapest University of Technology and Economics (BUTE) in 2002. Currently she is working towards the Ph.D. degree in informatics at the Department of Telecommunication and Media Informatics at the BUTE. Her research interests include non-cooperative game theory and its applications in telecommunications especially in inter-domain routing, intra-domain routing and peer-to-peer networks.

    Paolo Giaccone received the Dr. Ing. and Ph.D. degrees in telecommunications engineering from Politecnico di Torino, Italy, in 1998 and 2001, respectively. He is Assistant Professor in the Electronics Department, Politecnico di Torino. During the summer 1998, he visited the High Speed Networks Research Group at Lucent Technology, Holmdel, NJ. During 2000–2001 and during summer 2002, he visited the Electrical Engineering Department, Stanford University. he held a Postdoctoral position at Politecnico di Torino between 2001 and 2002, and during summer 2002 at Stanford University. He is mainly interested in the performance evaluation of telecommunication networks, especially in the context of high-performance routers, wireless networks and peer-to-peer networks.

    View full text