Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3459104.3459184acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiseeieConference Proceedingsconference-collections
research-article

From Local Network Formation Game to Peer-to-Peer Protocol

Published: 20 July 2021 Publication History

Abstract

Peer-to-peer protocols often take longer, are less efficient or can't complete lookup queries with increasing network diameter. Peers could mitigate this by increasing their degree, i.e., their amount of open connections, but this increases the operational cost for each peer.
We propose a novel peer-to-peer network formation protocol based on a game-theoretic approach, guaranteeing that diameter and maximum degree do not surpass given thresholds throughout the network. The game generalizes the local network formation game with more versatile strategies and cost functions. This allows for a trade off between operational cost and efficiency based on the individual interest of peers.
We show that for any given diameter k and maximum degree d a Nash equilibrium, i.e., a graph with the desired properties, can be reached by improvement steps. We validate the practical applicability of these theoretical results on networks of 5–50 participants with various strategies and configurations. The experimental results show a fast approximation of the desired properties while taking some time to reach a stable state. We make out several strategies with which the protocol performs well. In particular, a stable state is found quickly when the initial network was already close to a stable state. This property enables the efficient dynamic treatment of the in practice often occurring scenario of nodes joining or leaving the network.

References

[1]
Susanne Albers, Stefan Eilts, Eyal Even-Dar, Yishay Mansour, and Liam Roditty. 2006. On Nash equilibria for a network creation game. In Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. Society for Industrial and Applied Mathematics, 89–98.
[2]
Elliot Anshelevich, Anirban Dasgupta, Jon Kleinberg, Eva Tardos, Tom Wexler, and Tim Roughgarden. 2008. The price of stability for network design with fair cost allocation. SIAM J. Comput. 38, 4 (2008), 1602–1623.
[3]
Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, and Tom Wexler. 2003. Near- optimal network design with selfish agents. In Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. ACM, 511–520.
[4]
Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).
[5]
Béla Bollobás. 2004. Extremal graph theory. Courier Corporation.
[6]
Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz. 2004. Characterizing selfishly constructed overlay routing networks. In IEEE INFOCOM 2004, Vol. 2. IEEE, 1329–1339.
[7]
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W Hong. 2001. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies. Springer, 46–66.
[8]
Jacomo Corbo and David Parkes. 2005. The price of selfish behavior in bilateral network formation. In Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing. ACM, 99–107.
[9]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth Interna- tional Conference on. IEEE, 1–10.
[10]
Anthony Dekker, Hebert Pérez-Rosés, Guillermo Pineda-Villavicencio, and Paul Watters. 2012. The maximum degree & diameter-bounded subgraph and its applications. Journal of Mathematical Modelling and Algorithms 11, 3 (2012), 249–268.
[11]
Paul Erdős, Alfréd Rényi, and Vera T. Sós. 1962. On a problem in the theory of graphs. Publications of the Mathematical Institute of the Hungarian Academy of Sciences 7 (1962), 215–235.
[12]
Alex Fabrikant, Ankur Luthra, Elitza Maneva, Christos H. Papadimitriou, and Scott Shenker. 2003. On a network creation game. In Proceedings of the twenty- second annual symposium on Principles of distributed computing. ACM, 347–351.
[13]
Matthew O. Jackson. 2005. A survey of network formation models: stability and efficiency. Group Formation in Economics: Networks, Clubs, and Coalitions (2005), 11–49.
[14]
Matthew O. Jackson. 2010. Social and economic networks. Princeton university press.
[15]
Mina Kamel, Caterina Scoglio, and Todd Easton. 2007. Optimal topology design for overlay networks. In International Conference on Research in Networking. Springer, 714–725.
[16]
Henning Kopp, David Mödinger, Franz J Hauck, and Frank Kargl. 2019. Cryp- tographic Design of PriCloud, a Privacy-preserving Decentralized Storage with Remuneration. IEEE Transactions on Dependable and Secure Computing (2019).
[17]
David Mödinger, Henning Kopp, Frank Kargl, and Franz J. Hauck. 2018. A Flexible Network Approach to Privacy of Blockchain Transactions. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). IEEE, 1486–1491.
[18]
Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V Vazirani. 2007. Algo- rithmic game theory. Cambridge university press.
[19]
H. Zhang, A. Goel, and R. Govindan. 2002. Using the small-world model to improve Freenet performance. In Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3. 1228–1237 vol.3. https://doi.org/10.1109/INFCOM.2002.1019373.

Index Terms

  1. From Local Network Formation Game to Peer-to-Peer Protocol
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ISEEIE 2021: 2021 International Symposium on Electrical, Electronics and Information Engineering
      February 2021
      644 pages
      ISBN:9781450389839
      DOI:10.1145/3459104
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 July 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ISEEIE 2021

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 23
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media