Mathematics of Information Technology and Complex Systems





Homepage

 
Project Highlights

 
Milestones

 
Research

 
Team Members

 
Partner Organizations

 
Students

 
Publications

 
Presentations

 
Events

 
MITACS Home

 


Milestones

2005-2006

The objective of this project is to move towards modelling a variety of more realistic settings for selfish routing: 

  • Malicious users:  The users can be differentiated according to their perception of path costs (their disutility function). Typically, a network user would care for his/her own data flow, and try to optimize its delivery speed. But a malicious user would like to disrupt the other users’ goals, or the overall network performance.  One example is a denial-of-service attack, where malicious users would use their own demands in order to overwhelm a server.  The possibilities of malicious behavior are many, and each one of them gives rise to a different model.  We have initiated the study of malicious users and their effect on the network.
  • Path pricing:  The introduction of economic disincentives in the form of taxation on the network paths is a powerful tool for the network designer that wants to lure the selfish towards a flow pattern that achieves certain properties (e.g., flow that minimizes the total delay on the network). The users may have the same or different sensitivity on the pricing; e.g., in Quality-of-Service (QoS) networks, a user may be more concerned about the price of a path than its quality (speed) than another user who can afford a more expensive path of better quality. 
  • Elastic demands:  A typical assumption for the selfish routing networks studied so far by the theoretical computer science community is that the users’ demands are predetermined constants.  But this is not the case in real life:  an Internet user who downloads music from a server will request much less data from this server if the “connection" is “slow". Therefore the introduction of elastic demands, i.e., demands that depend on the network congestion, greatly enhances the applicability of the proposed research.
  • Dynamic networks:  The network elements (e.g., edge capacities) may not be constant during the operation, but they may vary with time. For example, certain edges of the network may be available only for certain periods during the day, or certain percentage of their capacity is dedicated to certain kinds of data traffic during certain periods of time. 

After the modelling stage, the resulting model can be studied from many different perspectives:

  • Equilibria existence:  Although for some of these settings, for example when the network is dynamic, the existence of equilibria has been proven, for others, and especially for combinations of them, the existence of equilibria is not known.  For example, while we have already shown that there are equilibria which achieve the minimum possible total latency through path pricing when the demands are fixed, we do not know whether such equilibria exist for elastic demands.  Although the existence of equilibria is not of great practical importance, it is the necessary first step in the computation of such equilibria.  Hence this is the starting point for our research.
  • Coordination ratio:  A central question that drives the current research in selfish routing is the comparison between the total (social) cost of a network at equilibrium and the minimum cost that can be achieved when there is a central coordinating authority. This coordination ratio, i.e., the ratio between the cost of the worst equilibrium over the optimum cost achieved by coordination, is an indicator of how much susceptible the network is to sub-par performance when the users are unregulated. The study of this performance measure is in itself a formidable research goal, and we have already made progress in the cases of capacitated networks and networks with malicious users, leading naturally to the following stage.
  • Network design:  This stage emphasizes the algorithmic (constructive) aspects of selfish routing.  We propose the study of computational methods that will help network designers to determine the performance of a network at equilibrium, and build networks with good characteristics.  For example, one can ask how big a price should a unit of data flow pay through the edges of the network in order to optimize the coordination ratio. If this pricing can be computed, it may point to unrealistically high prices, and this would mean that the designer would have to change other characteristics of the network, e.g., the priority given to classes of users. Vulnerability to malicious users and denial-of-service attacks should also be detectable and preventable.  All these issues give rise to many algorithmic and computational problems, which this project attempts to address.