A Pure Nash Equilibrium-Based Game Theoretical Method for Data Replication across Multiple Servers

被引:24
作者
Khan, Samee Ullah [1 ]
Ahmad, Ishfaq [2 ]
机构
[1] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
[2] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
Replica placement algorithm; static allocation; game theory; pure Nash equilibrium;
D O I
10.1109/TKDE.2008.171
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a noncooperative game theoretical technique to replicate data objects across a system of multiple servers in order to reduce user-perceived Web access delays. The proposed technique uses computational agents that compete with each other to optimize the performance of the servers that they represent. In a large multiagent system, agents may act in a self-interested manner because of their local and limited knowledge, which may negatively impact the systemwide performance. The optimality of a noncooperative game is typically described by Nash equilibrium, which is based on spontaneous and nondeterministic strategies. However, Nash equilibrium may or may not guarantee systemwide performance. Furthermore, there can be multiple Nash equilibria, making it difficult to decide which one is the best. In contrast, the proposed technique uses the notion of pure Nash equilibrium, which, if achieved, guarantees stable optimal performance. In the proposed technique, agents use deterministic strategies that work in conjunction with their self-interested nature but ensure systemwide performance enhancement. In general, the existence of a pure Nash equilibrium is hard to achieve, but we prove the existence of such equilibrium in the proposed technique. The proposed technique is also experimentally compared against some well-known conventional replica allocation methods such as branch-and-bound, greedy, and genetic algorithms. The experimental setup incorporates GT-ITM and Inet network topology generators and 1998 Soccer World Cup access logs to closely mimic the Web in its infrastructure and user access patterns.
引用
收藏
页码:537 / 553
页数:17
相关论文
共 41 条
[1]  
[Anonymous], HPL199935R1
[2]  
[Anonymous], 2002, P INT WORKSH WEB CON
[3]  
CASEY R, 1972, P SPRING JOINT COMP, P617
[4]   Towards capturing representative AS-level Internet topologies [J].
Chang, H ;
Govindan, R ;
Jamin, S ;
Shenker, SJ ;
Willinger, W .
COMPUTER NETWORKS, 2004, 44 (06) :737-755
[5]  
Chun B. G., 2004, P 23 ANN ACM S PRINC, P21
[6]  
Cook DJ, 2006, LECT NOTES COMPUT SC, V4008, P165
[7]  
DOWDY LW, 1982, COMPUT SURV, V14, P287, DOI 10.1145/356876.356883
[8]  
Eswaran K.P., 1974, PROC IFIPS C, P304
[9]  
Fabrikant A., 2004, P 36 ANN ACM S THEOR, P604
[10]   Difficulties in simulating the Internet [J].
Floyd, S ;
Paxson, V .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2001, 9 (04) :392-403