+ All Categories
Home > Documents > Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of...

Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of...

Date post: 21-Dec-2015
Category:
View: 231 times
Download: 0 times
Share this document with a friend
Popular Tags:
51
Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong Kong Daniel R. Figueiredo School of Computer and Communication Sciences Swiss Federal Institute of Technology – Lausanne (EPFL) ACM SIGMETRICS / IFIP Performance June 2006
Transcript
Page 1: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Introduction to Game Theory and its Applications

in Computer Networks

Introduction to Game Theory and its Applications

in Computer Networks

John C.S. LuiDept. of Computer Science &

Engineering

The Chinese University of Hong Kong

Daniel R. FigueiredoSchool of Computer and

Communication Sciences

Swiss Federal Institute of Technology – Lausanne (EPFL)

ACM SIGMETRICS / IFIP Performance

June 2006

Page 2: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Tutorial Organization Two parts of 90 minutes

15 minutes coffee break in between

First part: introduction to game theory definitions, important results, (simple) examples divided in two 45 minutes sessions (Daniel + John)

Second part: game theory and networking game-theoretic formulation of networking problems 1st 45 minute session (Daniel)

• routing games and congestion control games 2nd 45 minute session (John)

• overlay games and wireless games

Page 3: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

What is Game Theory About? Analysis of situations where conflict of

interests are present

Goal is to prescribe how conflicts can be resolved

2

2

Game of Chicken driver who steers away looses

What should drivers do?

Page 4: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Applications of Game Theory Theory developed mainly by mathematicians and economists

contributions from biologists Widely applied in many disciplines

from economics to philosophy, including computer science (Systems, Theory and AI) goal is often to understand some phenomena

“Recently” applied to computer networks Nagle, RFC 970, 1985

• “datagram networks as a multi-player game” paper in first volume of IEEE/ACM ToN (1993) wider interest starting around 2000

Page 5: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Limitations of Game Theory

No unified solution to general conflict resolution Real-world conflicts are complex

models can at best capture important aspects Players are (usually) considered rational

determine what is best for them given that others are doing the same No unique prescription

not clear what players should do

But it can provide intuitions, suggestions and partial prescriptions best mathematical tool we currently have

Page 6: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

What is a Game? A Game consists of

at least two players a set of strategies for each player a preference relation over possible outcomes

Player is general entity individual, company, nation, protocol, animal, etc

Strategies actions which a player chooses to follow

Outcome determined by mutual choice of strategies

Preference relation modeled as utility (payoff) over set of outcomes

Page 7: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Classification of Games

Many, many types of games three major categories

Non-Cooperative (Competitive) Games individualized play, no bindings among

players

Repeated and Evolutionary Games dynamic scenario

Cooperative Games play as a group, possible bindings

Page 8: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Matrix Game (Normal form)

Simultaneous play players analyze the game and write their strategy on a paper

Combination of strategies determines payoff

A B C

A (2, 2) (0, 0) (-2, -1)

B (-5, 1) (3, 4) (3, -1)Player 1

Player 2Strategy set for Player 1

Strategy set for Player 2

Payoff toPlayer 1

Payoff toPlayer 2

Representation of a game

Page 9: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

More Formal Game Definition

Normal form (strategic) game a finite set N of players a set strategies for each player payoff function for each player

• where is the set of strategies chosen by all players

A is the set of all possible outcomes is a set of strategies chosen by players

defines an outcome

)(sui

NiiA

jNj AAs Ni

As

Aui :

Page 10: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Two-person Zero-sum Games

One of the first games studied most well understood type of game

Players interest are strictly opposed what one player gains the other loses game matrix has single entry (gain to player

1) Intuitive solution concept

players maximize gains unique solution

Page 11: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Analyzing the Game Player 1 maximizes matrix entry, while player

2 minimizes

A B C D

A 12 -1 1 0

B 3 1 3 -18

C 5 2 4 3

D -16 1 2 -1

Player 1

Player 2

Strictly dominatedstrategy

(dominated by C)

Strictly dominatedstrategy

(dominated by B)

Page 12: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Dominance Strategy S strictly dominates a strategy T if every

possible outcome when S is chosen is better than the corresponding outcome when T is chosen

Dominance Principle rational players never choose strictly dominated

strategies

Idea: Solve the game by eliminating strictly dominated strategies! iterated removal

Page 13: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Solving the Game

L M R

T -2 -1 4

B 3 2 3Player 1

Player 2

Iterated removal of strictly dominated strategies

Player 1 cannot remove any strategy (neither T or B dominates the other) Player 2 can remove strategy R (dominated by M) Player 1 can remove strategy T (dominated by B) Player 2 can remove strategy L (dominated by M) Solution: P1 -> B, P2 -> M

• payoff of 2

Page 14: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Solving the Game

A B D

A 12 -1 0

C 5 2 3

D -16 0 -1

Player 1

Player 2

Removal of strictly dominates strategies does not always work

Consider the game

Neither player has dominated strategies Requires another solution concept

Page 15: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Analyzing the Game

A B DA 12 -1 0C 5 2 3D -16 0 -1

Player 1

Player 2

Outcome (C, B) seems “stable”saddle point of game

Page 16: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Saddle Points An outcome is a saddle point if it is both

less than or equal to any value in its row and greater than or equal to any value in its column

Saddle Point Principle Players should choose outcomes that are

saddle points of the game

Value of the game value of saddle point outcome if it exists

Page 17: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Why Play Saddle Points?

If player 1 believes player 2 will play B player 1 should play best response to B (which is C)

If player 2 believes player 1 will play C player 2 should play best response to C (which is B)

A B D

A 12 -1 0

C 5 2 3

D -16 0 -1

Player 1

Player 2

Page 18: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Why Play Saddle Points?

A B D

A 12 -1 0

C 5 2 3

D -16 0 -1

Player 1

Player 2

Why should player 1 believe player 2 will play B? playing B guarantees player 2 loses at most v (which is 2)

Why should player 2 believe player 1 will play C? playing C guarantees player 1 wins at least v (which is 2)

Powerful arguments to play saddle point!

Page 19: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Solving the Game (min-max algorithm)

choose minimum entry in each row

choose the maximum among these

this is maximin value

A B C D

A 4 3 2 5

B -10 2 0 -1

C 7 5 1 3

D 0 8 -4 -5

Player 1

Player 2

2

-10

1

-5

7 8 2 5

choose maximum entry in each column

choose the minimum among these

this is the minimax value

if minimax == maximin, then this is the saddle point of game

Page 20: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Multiple Saddle Points

A B C D

A 3 2 2 5

B 2 -10 0 -1

C 5 2 2 3

D 8 0 -4 -5

Player 1

Player 2

2

-10

2

-5

8 2 2 5

In general, game can have multiple saddle points

Same payoff in every saddle point unique value of the game

Strategies are interchangeable Example: strategies (A, B) and (C, C) are saddle points

then (A, C) and (C, B) are also saddle points

Page 21: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Games With no Saddle Points

What should players do? resort to randomness to select strategies

A B C

A 2 0 -1

B -5 3 1Player 1

Player 2

Page 22: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Mixed Strategies Each player associates a probability

distribution over its set of strategies players decide on which prob. distribution to use

Payoffs are computed as expectations

C D

A 4 0

B -5 3Player 1

1/3 2/3

Payoff to P1 when playing A = 1/3(4) + 2/3(0) = 4/3Payoff to P1 when playing B = 1/3(-5) + 2/3(3) = 1/3

How should players choose prob. distribution?

Page 23: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Mixed Strategies Idea: use a prob. distribution that cannot

be exploited by other player payoff should be equal independent of the

choice of strategy of other player guarantees minimum gain (maximum loss)

C D

A 4 0

B -5 3Player 1

Payoff to P1 when playing A = x(4) + (1-x)(0) = 4xPayoff to P1 when playing B = x(-5) + (1-x)(3) = 3 – 8x

4x = 3 – 8x, thus x = 1/4

How should Player 2 play?x (1-x)

Page 24: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Mixed Strategies Player 2 mixed strategy

1/4 C , 3/4 D maximizes its loss independent of P1 choices

Player 1 has same reasoning

C D

A 4 0

B -5 3Player 1

Payoff to P2 when playing C = x(-4) + (1-x)(5) = 5 - 9xPayoff to P2 when playing D = x(0) + (1-x)(-3) = -3 + 3x

5 – 9x = -3 + 3x, thus x = 2/3

Player 2

x

(1-x)

Payoff to P2 = -1

Page 25: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Minimax Theorem

Every two-person zero-sum game has a solution in mixed (and sometimes pure) strategies solution payoff is the value of the game maximin = v = minimax v is unique multiple equilibrium in pure strategies

possible• but fully interchangeable

Proved by John von Neumann in 1928! birth of game theory…

Page 26: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Two-person Non-zero Sum Games Players are not strictly opposed

payoff sum is non-zero

A B

A 3, 4 2, 0

B 5, 1 -1, 2Player 1

Player 2

Situations where interest is not directly opposed players could cooperate

Page 27: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

What is the Solution? Ideas of zero-sum game:

saddle points pure strategy

equilibrium

mixed strategies equilibrium no pure strategy eq.

A B

A 5, 0 -1, 4

B 3, 2 2, 1

Player 1

Player 2

A B

A 5, 4 2, 0

B 3, 1 -1, 2

Player 1

Player 2

Page 28: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Multiple Solution Problem

Games can have multiple equilibria not equivalent: payoff is different not interchangeable: playing an equilibrium

strategy does not lead to equilibrium

A B

A 1, 4 1, 1

B 0, 1 2, 2

Player 1

Player 2

equilibria

Page 29: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

The Good News: Nash’s Theorem

Every two person game has at least one equilibrium in either pure or mixed strategies

Proved by Nash in 1950 using fixed point theorem generalized to N person game did not “invent” this equilibrium concept

Def: An outcome o* of a game is a NEP (Nash equilibrium point) if no player can unilaterally change its strategy and increase its payoff

Cor: any saddle point is also a NEP

Page 30: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

The Prisoner’s Dilemma One of the most studied and used games

proposed in 1950s Two suspects arrested for joint crime

each suspect when interrogated separately, has option to confess or remain silent

S C

S 2, 2 10, 1

C 1, 10 5, 5

Suspect 1

Suspect 2

payoff is years in jail(smaller is better)

single NEPbetter outcome

Page 31: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Pareto Optimal

Prisoner’s dilemma: individual rationality

S C

S 2, 210, 1

C1, 10

5, 5

Suspect 1

Suspect 2

Another type of solution: group rationality Pareto optimal

Def: outcome o* is Pareto Optimal if no other outcome is better for all players

Pareto Optimal

Page 32: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Game of Chicken Revisited

2

2

Game of Chicken (aka. Hawk-Dove Game) driver who swerves looses

swerve stay

swerve 0, 0 -1, 5

stay 5, -1-10, -

10

Driver 1

Driver 2Drivers want

to do opposite of one

anotherWill prior

communication help?

Page 33: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly

Several firms produce exactly same product : quantity produced by firm

Cost to firm i to produce quantity

Market clearing price (price paid by consumers)

where Revenue of firm i

iq Ni ,,1

)( ii qC

iq

)(QP

i iqQ

)()(),( iiiii qCQPqQqU

How much should firm i produce?

Page 34: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly

Consider two firms: Simple production cost

no fixed cost, only marginal cost with constant c Simple market (fixed demand a)

where Revenue of firm

Firms choose quantities simultaneously Assume c < a

2,1i

iii cqqC )(

)()( QaQP

21 qqQ

))(()(),( 21 cqqaqcqQaqQqU iiiii 2,1i

Page 35: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly

Two player game: Firm 1 and Firm 2 Strategy space

production quantity since if ,

What is the NEP? aQ 0)( QP0iq

aqi

To find NEP, firm 1 solves

To find NEP, firm 2 solves

))((max 2110 1

cqqaqaq

))((max 2120 2

cqqaqaq

value chosen

by firm 2

value chosen

by firm 1

Page 36: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly

Solution to maximization problem first order condition is necessary and sufficient

Best response functions best strategy for player 1, given choice for player 2

At NEP, strategies are best response to one another need to solve pair of equations

using substitution…

2)( 2*

121

cqaqqb

2)( 1*

212

cqaqqb

and

2

*2*

1

cqaq

2

*1*

2

cqaq

),( *2

*1 qq

and

Page 37: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly NEP is given by

Total amount produced at NEP: Price paid by consumers at NEP:

3*2

*1

caqq

Consider a monopoly (no firm 2, ) 02 q

Equilibrium is given by 2)(*1 caq

Total amount produced: Price paid by consumers:

)(3

2caQ

3

2)(

caQP

)(2

1caQ

2)(

caQP

less quantity produced

higher price

Competition can be good!

Page 38: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Example: Cournot Model of Duopoly Graphical approach: best response functions

2)( 221

cqaqb

2)( 112

cqaqb

Plot best response for firm 1

Plot best response for firm 2

1q

2q

)( 21 qb

)( 12 qb

2)( ca

ca

2)( ca ca

NEP: strategies are mutual best responses all intersections

are NEPs

Page 39: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Game Trees (Extensive form) Sequential play

players take turns in making choices previous choices can be available to players

Game represented as a tree each non-leaf node represents a decision point for some player edges represent available choices

Can be converted to matrix game (Normal form) “plan of action” must be chosen before hand

Page 40: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Game Trees Example

Strategy set for Player 1: {L, R}

Player 1

Player 2 Player 2L

L

R

RR L

3, 1 1, 2 -2, 1 0, -1

Strategy for Player 2: __, __

what to do when P1 plays

L

what to do when P1 plays

R Strategy set for Player 2:

{LL, LR, RL, RR}

Payoff toPlayer 2

Payoff toPlayer 1

Page 41: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

More Formal Extensive Game Definition

An extensive form game a finite set N of players a finite height game tree payoff function for each player

• where s is a leaf node of game tree

Game tree: set of nodes and edges each non-leaf node represents a decision point for some player edges represent available choices (possibly infinite)

Perfect information all players have full knowledge of game history

)(sui Ni

Page 42: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Game Tree Example Microsoft and Mozilla are deciding on adopting new

browser technology (.net or java) Microsoft moves first, then Mozilla makes its move

Microsoft

Mozilla Mozilla.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

Non-zero sum game what are the NEP?

Page 43: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Converting to Matrix Game

Every game in extensive form can be converted into normal form exponential growth in number of strategies

.net, .net

.net, java

java, .net

java, java

.net 3, 1 3, 1 1, 0 1, 0

java 0, 0 2, 2 0, 0 2, 2

Microsoft

Mozilla

.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

Page 44: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

NEP and Incredible Threats

Microsoft

Mozilla

.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

NEP

incrediblethreat Play “java no matter what” is not credible for Mozilla

if Microsoft plays .net then .net is better for Mozilla than java

.net, .net

.net, java

java, .net

java, java

.net 3, 1 3, 1 1, 0 1, 0

java 0, 0 2, 2 0, 0 2, 2

Page 45: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Solving the Game (backward induction) Starting from terminal nodes

move up game tree making best choice

Best strategy for Mozilla: .net, java (follow Microsoft)

.net java

3, 1 2, 2

Best strategy for Microsoft: .net

Single NEPMicrosoft -> .net, Mozilla -> .net, java

Equilibriumoutcome

.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

Page 46: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Backward Induction on Game Trees

Kuhn’s Thr: Backward induction always leads to saddle point (on games with perfect information) game value at equilibrium is unique (for zero-sum games)

In general, multiple NEPs are possible after backward induction cases with no strict preference over payoffs

Effective mechanism to remove “bad” NEP incredible threats

Page 47: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Leaders and Followers What happens if Mozilla is moves first?

Mozilla

Microsoft Microsoft.net

.net

java

javajava .net

1, 3 0, 1 0, 0 2, 2

NEP after backward induction:Mozilla: javaMicrosoft: .net, java Outcome is better for Mozilla, worst for Microsoft

incredible threat becomes credible! 1st mover advantage

but can also be a disadvantage…

Page 48: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

The Subgame Concept Def: a subgame is any subtree of the original

game that also defines a proper game includes all descendents of non-leaf root node

3 subtrees full tree, left tree, right tree

Microsoft

Mozilla Mozilla.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

Page 49: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Subgame Perfect Nash Equilibrium Def: a NEP is subgame perfect if its

restriction to every subgame is also a NEP of the subgame

Thr: every extensive form game has at least one subgame perferct Nash equilibrium Kuhn’s theorem, based on backward induction

Set of NEP that survive backward induction in games with perfect information

Page 50: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Subgame Perfect Nash Equilibrium

Microsoft

Mozilla Mozilla.net

.net

java

javajava .net

3, 1 1, 0 0, 0 2, 2

NN NJ JN JJ

N 3,1 3,1 1,0 1,0

J 0,0 2,2 0,0 2,2MS

Mozilla

JN

(N, NN) is not a NEP when restricted to the subgame starting at J

(J, JJ) is not a NEP when restricted to the subgame starting at N

(N, NJ) is a subgame perfect Nash equilibrium

Subgame Perfect NEP

Not subgame Perfect NEP

Page 51: Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong.

Title


Recommended