Near Rationality and Competitive Equilibria in Networked
christin@sims.berkeley.edu jensg@sims.berkeley.edu chuang@sims.berkeley.edu
School of Information Management and Systems
ABSTRACT
in considering network participants as selfish [30] or competing[29] entities. For instance, in an effort to discourage free-riding,
A growing body of literature in networked systems research relieson game theory and mechanism design to model and address the
some deployed peer-to-peer systems such as KaZaA or BitTorrent
potential lack of cooperation between self-interested users. Most
[9] rely on simple incentive mechanisms. More generally, as sum-
game-theoretic models applied to system research only describe
marized in [13, 26, 30], a number of recent research efforts have
competitive equilibria in terms of pure Nash equilibria, that is, a
been applying concepts from game theory and mechanism designto networked systems in an effort to align the incentives of each
situation where the strategy of each user is deterministic, and is her
(self-interested) user with the goal of maximizing the overall sys-
best response to the strategies of all the other users. However, theassumptions necessary for a pure Nash equilibrium to hold may be
too stringent for practical systems. Using three case studies on net-
A cornerstone of game theory and mechanism design is the no-
work formation, computer security, and TCP congestion control,
tion of competitive equilibrium, which is used to predict user be-
we outline the limits of game-theoretic models relying on Nash
havior and infer the outcome of a competitive game. As discussedin [26], the concept of Nash equilibrium is predominantly used in
equilibria, and we argue that considering competitive equilibria ofa more general form helps in assessing the accuracy of a game the-
system research to characterize user behavior. Assuming each user
oretic model, and can even help in reconciling predictions from
obtains a utility dependent on the strategy she adopts, a Nash equi-
game-theoretic models with empirically observed behavior.
librium is defined as a set of strategies from which no user willingto maximize her own utility has any incentive to deviate [25].
While Nash equilibria are a very powerful tool for predicting
Categories and Subject Descriptors
outcomes in competitive environments, their application to system
C.2 [Computer Systems Organization]: Computer-Communication
design generally relies on a few assumptions, notably, that (1) each
participant is infallible (i.e., perfectly rational), and that (2) eachuser has perfect knowledge of the structure of the game, includ-
General Terms
ing strategies available to every other participant and their asso-ciated utilities. There seems to be a class of problems for which
these assumptions may be too restrictive, for instance, characteriz-ing competitive equilibria in systems where participants have lim-
Keywords
ited knowledge of the state of the rest of the network.
Distributed systems, Game theory, Competitive equilibria, Model-
As a practical example of the potential limits of a game theoreti-
cal analysis of a networked system solely based on Nash equilibria,one can argue that, in the case of a peer-to-peer file-sharing system
INTRODUCTION
that does not provide incentives for users to share, the unique Nashequilibrium leads to the “tragedy of the commons [18],” that is, a
Empirical evidence of phenomena such as free-riding in peer-to-
situation where users do not share anything to minimize the cost
peer systems [1] or unfairness in ad-hoc networks [19] challenges
they incur, thereby leading the entire system to collapse. The mere
the traditional system design assumption that all users of a network
fact that, in practice, some users are sharing files, even in peer-to-
are able and willing to cooperate for the greater good of the commu-
peer systems that do not rely on incentive mechanisms, hints that a
nity. Hence, system architects have become increasingly interested
Nash equilibrium is not actually reached.
The argument that Nash equilibria may be too restrictive to char-
acterize networked systems is not entirely new. In [14], Friedmanand Shenker notably argued that equilibria resulting from learn-
Permission to make digital or hard copies of all or part of this work forpersonal or classroom use is granted without fee provided that copies are
ing behaviors were a tool better suited for characterizing how net-
not made or distributed for profit or commercial advantage and that copies
work users share network resources than Nash equilibria. In this
bear this notice and the full citation on the first page. To copy otherwise, to
paper, we take a quite different stand, by advocating to consider
republish, to post on servers or to redistribute to lists, requires prior specific
competitive equilibria of a slightly more general form than pure
Nash equilibria. More precisely, we argue that using simple exten-
SIGCOMM’04 Workshops, Aug. 30+Sept. 3, 2004, Portland, Oregon, USA.
sions of pure Nash equilibria (1) helps to assess the robustness of a
Copyright 2004 ACM 1-58113-942-X/04/0008 .$5.00.
game-theoretic model to small deviations from expected behavior,
with a Nash prediction of a game but always contains a small er-
thereby providing insight in the accuracy of the model, and (2) may
ror. She is playing in an auction with an asymmetry between the
help reconcile empirical observations with analytical modeling.
expected cost of overshooting and undershooting the Nash solu-
We illustrate our point by presenting three case studies, on net-
tion. If overshooting is less costly, the player’s strategy will most
work formation, security, and TCP congestion control, where out-
likely contain a small upward bias. If a substantial part of the other
comes predicted by Nash equilibria are not entirely correlated by
players shares this marginal bias the outcome of the auction can
empirical observations. In each case study, we investigate if and
be surprisingly far away from a Nash prediction [15]. Similarly,
how more general forms of competitive equilibria can be used to
in a sealed-bid auction the Nash equilibrium outcome predicts that
better describe observed behavior, or if, on the other hand, the
a player with a lower valuation will only sometimes win the auc-
tioned good. However, this outcome is more likely if players share
The remainder of this paper is organized as follows. In Section 2,
small imperfections in the execution of their Nash strategies [21].
we provide some background by formally discussing the concept
Such systematic and non-systematic deviations and their out-
of Nash equilibrium and its extensions or potential alternatives. In
comes have been motivation to formulate more generalized models
Section 3, we present our case studies. Finally, in Section 4, we
of strategic behavior that include the notion of the Nash equilib-
discuss our findings, outline a possible agenda for future research,
rium as a special case. In particular, to relax the assumption of per-
and draw conclusions from our observations.
fect rationality required by the concept of Nash equilibrium, somehave introduced the concept of bounded rationality. Players that
BACKGROUND
are bounded rational are not necessarily picking the best strategyavailable across the entire decision space, but instead are allowed
We consider strategic interactions (called games) of the follow-
to make small errors on a number of levels, such as the evaluation
ing simple form: the individual decision-makers (also called play-
of the payoffs associated with a strategy, the assessment of the best
ers) of a game simultaneously choose actions that are derived from
available strategy, or the execution of a specific strategy.
their available strategies. The players will receive payoffs that de-
Some techniques to model bounded rationality introduce (possi-
pend on the combination of the actions chosen by each player.
bly small) amounts of noise into the decision-making process. As
More precisely, consider a set N = {1, ., n} of players. De-
an example, the noisy introspection model [16] relies on (possi-
note as Si the set of pure (i.e., deterministic) strategies available to
bly many) layers of speculation on the beliefs about other players’
player i, and denote as si an arbitrary member of i’s strategy set. A
beliefs. When all beliefs are perfectly correct, adding layers of
probability distribution over pure strategies is called a mixed strat-
speculation can only converge to a Nash equilibrium. However, the
egy σi. Accordingly, the set of mixed strategies for each player, Σi,
authors of [16] show that, by including some small (noisy) uncer-
contains the set of pure strategies, Si, as degenerate cases. Each
tainty in the conjectures about other players beliefs, the game can
player’s randomization is statistically independent of those of the
produce outcomes significantly different from a Nash equilibrium.
other players. Then, ui represents player i’s payoff (or utility) func-
Another model of equilibrium with bounded rationality, called
tion: ui(σi, σ−i) is the payoff to player i given her strategy (σi)
Quantal Response Equilibrium, or QRE [23], has been used to
and the other players’ strategies (summarized as σ−i). An n-player
characterize equilibria in games where users make errors on the
game can then be described as G = {N; Σi, Σ−i; ui, u−i}.
computation of the payoffs associated with a given strategy. Given
Players are in a Nash equilibrium if a change in strategies by any
two strategies and their associated payoffs (u1, u2), with u1 >
one of them would lead that player to obtain a lower utility than
u2, an a priori rational player may choose the strategy yielding
if she remained with her current strategy [25]. Formally, we can
u2 if she makes errors (ε1, ε2) in the computation of the pay-
offs (u1, u2) such that u1 + ε1 < u2 + ε2. McFadden showedthat, in such a context, one could express the probability of choos-
DEFINITION 1. A vector of mixed strategies σ∗ = (σ∗1, ., σ∗n) ∈
ing the strategy yielding u1 as a power function Pr(choose 1) =
Σ comprises a mixed-strategy Nash equilibrium of a game G if, foreλu1/(eλu1 + eλu2), where λ is a factor that characterizes the prob-
all i ∈ N and for all σi ∈ Σi, ui(σi, σ∗−i) − ui(σ∗i, σ∗−i) ≤ 0.
ability of the player making a mistake in the choice of the “right”strategy [22]. Namely, λ = 0 indicates that the player chooses
A pure-strategy Nash equilibrium is a vector of pure strategies,
at random regardless of the payoffs, while λ → ∞ converges to
s∗ ∈ S, that satisfies the equivalent condition.
the Nash behavior of always selecting the strategy with the higher
The main advantage of the concept of Nash equilibrium resides
payoff. At the Quantal Response Equilibrium, the vector of mixed
in its simplicity. However, because Nash equilibria rely on very
strategies σ∗ used by the players satisfies σ∗ = T (u(σ∗)), where
stringent assumptions on the capabilities and objectives of each
u(.) is the function that maps a set of mixed strategies to a set of
player, they can predict counter-intuitive or unrealistic outcomes.
payoffs, and T (.) is the function that maps a set of payoffs to a set
Thus, the economics community has provided an increasing num-
of mixed strategies.1 Thus, a QRE results in a set of conditions on
ber of refinements to strengthen the concept of Nash equilibrium
(e.g., perfect vs. proper equilibria). Similarly, some have investi-
Models such as QRE or noisy introspection are very useful as
gated how to weaken the rational choice assumptions on which the
an empirical structure for uncovering features of payoffs from field
Nash equilibrium concept is built: a rational player is expected to
data, or to obtain relationships between observables and primitives
demonstrate error-free decision-making, to have perfect foresight
of interest [17]. In other words, models and equilibrium concepts
of the game and to be unbounded in her computational abilities. In-
for bounded rationality can help reconcile data observed experi-
tuitively, players such as network users (which are not necessarily
mentally with a game theoretic analysis.
perfectly rational) or automated agents (which can be faulty, due to
For the preliminary analysis we present in this paper, we will fo-
software bugs or misconfiguration, or have limited computational
cus on a particular type of bounded rational behavior, called near
resources) will likely deviate from these rigid assumptions. rationality [3, 27]. In near rational equilibria a player who is not
As an illustration of how the assumptions required in a Nash
equilibrium may need to be relaxed in practice, consider, an expe-
1The Brouwer fixed point theorem indicates that such an equilib-
rienced player whose strategy choice is almost perfectly correlated
rium exists as soon as the function T (e(.)) is continuous.
perfectly maximizing her utility cannot improve her payoff by a
Network Formation
substantial amount by playing her Nash strategy more accurately.
For our first case study, we briefly discuss network formation by
While the personal losses for a player are potentially very small,
self-interested parties. Following seminal work in economics [20],
the equilibria derived often represent substantial departures from a
network formation has lately received relatively significant atten-
prediction based on perfect Nash optimizing behavior. As we will
tion in the networking research community. We refer the interested
discuss in the remainder of this paper, models of near rationality
reader to recent studies, such as [7, 11], for an in-depth discussion
are appropriate for the description of empirical phenomena but can
of the problem. Here, our only focus is to show how considering
also contribute explanations and predictions of strategic behavior.
near rational behavior, as opposed to Nash behavior, can help us
In addition, we will also illustrate how models of near rational-
validate or invalidate a game theoretic model.
ity can be used to assess the accuracy and robustness of a given
We define a network as a set of n nodes connected by a set of
game-theoretic model, which can possibly lead to refinements of
k directed links (where k ≤ 2n(n − 1)). Each node is used to store
items that are of interest to other nodes. We follow the genericnetwork model described in [6] where each node can request items,
CASE STUDIES
serve items, or forward requests between other nodes. As in [6], weassume shortest-path routing. Using a few simplifying assumptions
In this section, we present three case studies on network forma-
(e.g., all nodes are considered to have the same capabilities, all
tion, security, and TCP congestion control. For each of the case
links have the same establishment cost, and requests for items are
studies, we describe the interaction between the different partici-
uniformly distributed over the entire network), the authors of [6]
pants in terms of a game, and note the discrepancies between the
express the cost associated to each node i as
game outcome as predicted by a Nash equilibrium and the behav-ior observed empirically. Allowing for near rationality allows us to
+ lEdi,j + rEbj,k(i) + m deg(i) ,
determine if the outcome is highly sensitive to small variations in
player behavior, in which case the model might need to be refined.
where Edi,j is the expected value of the topological distance (hop-
In cases where the model seems sufficiently robust, we then discuss
count) between node i and another node j, Ebj,k(i) is the expected
whether considering near rational players can lead to more accurate
value of the probability that node i is on the path between two
arbitrary nodes j and k, and deg(i) is the out-degree of node i,that is, the number of nodes node i links to. The constants s, l, rPreliminaries
and m represent the nominal costs associated with storing an item,
Before we delve into the details of each case study, we discuss
retrieving an item one hop away, routing a request between two
in more details the equilibrium concept that we use for the analysis
other nodes, and maintaining a connection to another node, respec-
in the remainder of this paper. As we mentioned before, we are
tively. From this cost model, we can immediately define the utility
interested in assessing if near rationality can help us build better
game theoretic models for networked systems. Here, we will focus
on a simple, but powerful model of near rationality, called the ε-
Assume that nodes can choose which links they maintain, but do
The ε-equilibrium concept [27] is relaxing the conception of a
not have any control over the items they hold, and honor all routing
fully rational player to a model where each player is satisfied to
requests. In other words, nodes are selfish when it comes to link
get close to (but does not necessarily achieve) her best response to
establishment, but are obedient once links are established.
the other player’s strategies. No player can increase her utility bymore than ε by choosing another strategy. Therefore, we locate an
PROPOSITION 1. With the utility function given in Eq. (1), ifε-equilibrium by identifying a strategy for each player so that her
m < l/n, the fully connected network where each node links to
payoff is within ε of the maximum possible payoff given the other
every other node is a unique pure Nash equilibrium.
Formally, an ε-equilibrium can be defined as follows:
ROPOSITION 2. If m > l/n, the star-shaped network, whereall links connect to or from a central node, is a pure Nash equilib-
DEFINITION 2. A vector of mixed strategies σε = (σε
Σ comprises a mixed-strategy ε-equilibrium of a game G if, for
Propositions 1 and 2, whose proofs are in Appendix A, tell us
all i ∈ N, for all σi ∈ Σi, and a fixed ε > 0, ui(σi, σε−i) −
that, if maintaining links is cheap, or if the network is small, the
ui(σεi, σε−i) ≤ ε.
only Nash equilibrium is the fully connected network. If maintain-
A pure-strategy ε-equilibrium is a vector of pure strategies, sε ∈ S,
ing links is more expensive, or if the network is large, a star-shaped
that satisfies the equivalent condition. If we allow ε = 0 this con-
network is a possible Nash equilibrium.2 While the star may not be
dition reduces to the special case of a Nash equilibrium. Thus, one
a unique Nash equilibrium, the high aggregate utility of the star [6]
can consider ε-equilibria as a more generalized solution concept
suggests it may dominate other potential Nash equilibria. We note
that the authors of [20] obtain comparable results using a slightly
We emphasize again that other equilibrium concepts, including
bounded rationality models, are probably equally, if not more, use-
Thus, if the model is accurate, and if nodes behave fully ratio-
ful in modeling and analyzing networked systems. However, since
nally, we should expect predominance of fully-connected or star-
the main objective of this paper is to show how equilibrium con-
shaped networks in practice. However, if instead of considering
cepts that are conceptually quite close to Nash equilibria can help
Nash equilibrium, we now consider an ε-equilibrium, then, for any
improve the game theoretic analysis of networked systems, we de-
m ∈ [l/n − ε, l/n + ε], any network topology constitutes an ε-
fer the discussion of the applicability of more elaborate models
equilibrium. (This can be proven by simply including ε in all the
of near (or bounded) rationality to future work, and will use ε-
2In the limit case where m is exactly equal to l/n, any network
equilibria for the analysis in the remainder of this section.
derivations of Appendix A.) Additionally, if, to account for fail-
that, while the size n of the network does not play a central role in
ures in link establishment due for instance to lossy channels, we
our model, we expect the scenario we describe to be more realistic
allow nodes to use mixed strategies instead of being restricted to
in the case of a small corporate or university network, that is when
pure strategies, we conjecture that the range of possible values for
m such that any network is an ε-equilibrium is much larger than2ε.
PROPOSITION 3. The game described above has a unique pure
In other words, even a detailed cost model as proposed in [6]
Nash equilibrium, where all users choose an identical security level
appears to be highly sensitive to small changes in player behav-
ior. This high sensitivity hints that the game model needs to berefined, an intuition which is corroborated by empirical measure-
Proposition 3, whose proof we derive in Appendix B, tells us that,
ments. While star-shaped topologies or full meshes can indeed be
for a Nash equilibrium to hold, all users have to choose the highest
found in existing networks (e.g., many small local area networks
level of security available. As in the first case study, one could con-
use star topologies), measurement studies of Internet topologies
sider pure ε-equilibria to check the sensitivity of the model to small
exhibit much more varied results [12]. Among the reasons why
changes in player behavior. It can be shown that, for this specific
Internet topologies do not solely consist of an interconnection of
game, pure ε-equilibria produce results very close to Proposition 3,
star-shaped and fully connected networks, one can cite capacity
and thus the model seems reasonably robust to small perturbations.
constraints [7] or monetary incentives, which are not included in
In fact, due to the symmetry of the game, one can conjecture that,
regardless of the value of the penalty P , all users would implement
While proposing a game-theoretic model that captures these ad-
the same security level in a pure equilibrium.
ditional factors is outside of the scope of this paper, we summarize
However, available data from large networks, e.g., [8], docu-
the outcome of this first case study as follows: considering near
ments that different systems present highly heterogeneous security
rationality instead of perfect rationality can help us evaluate the ro-
vulnerabilities, which in turn indicates that implemented security
bustness of a model to small perturbations in the players actions. If
levels are highly disparate across machines. Hence, in the context
the model seems to lack robustness, its chances of being an accurate
of the security game we just described, a Nash equilibrium does not
seem to accurately describe observed behavior.
Some of the possible explanations for the heterogeneity of the
Protection Against Security Threats
implemented security levels can be captured by more elaborateequilibrium models. In particular, (1) users have incomplete in-
With our second case study, we hope to show that slightly mod-
formation on the levels of security deployed by other users, (2)
ifying the description of a game to account for near rationality al-
the perceived benefit of installing security patches may be smaller
lows to significantly improve the predictive quality of the game
than the overhead patching incurs, and (3) some users may be gam-
when compared to empirically observed behavior. To that effect,
bling (knowingly or not) on the seriousness of the security threats
we look at the level of security users choose in a network subject
they face. These three arguments all make the case for considering
to a security threat. Specifically, we focus on protection against
ε-equilibria (to account for (1) and (2)) with mixed strategies (to
potential distributed denial of service (DDoS) attacks. In the first
account for (2) and (3)), rather than a pure Nash equilibrium.
stage of a DDoS attack, an attacker looks for a (set of) machine(s)whose control she can easily seize, to use as a platform to launch
PROPOSITION 4. There exist mixed-strategy ε-equilibria with
an attack of larger magnitude. For instance, by obtaining total con-
ε ≤ P/4 where all chosen security levels are distributed over the
trol of a machine on a network, an attacker may be able to retrieve
passwords and gain access to more secure machines on the samenetwork.
Proposition 4, which we prove in Appendix B, indicates that con-
We model here a network of n users, who are all potential tar-
sidering ε-equilibria with mixed strategies allows us to predict large
gets in the initial stage of a DDoS attack. If we characterize the
dispersion of the chosen security levels, even for relatively low val-
level of computer security that each user i adopts by a variable si,
ues of ε. This result seems to be more in line with the available
the user(s) with the lowest si (i.e., si = smin = mini{si}) will
measurement data. We further note that analogous results have
be compromised. We assume that each user can infer the security
been recently derived to quantitatively model price dispersion phe-
level si used by every other user (e.g., by probing), and no finite
nomena [5], where assuming a Nash equilibrium likewise fails to
security level si can be selected to guarantee a protection against
all attacks. We further assume that the cost of implementing a secu-
We emphasize that Proposition 4 only states that near rational-
rity policy si is a monotonic increasing function of si. Specifically,
ity can explain dispersion. In particular, the proof of Proposition 4
to simplify the notations, we consider here that each user i that is
we present in Appendix B uses a specific distribution function to
not compromised pays si to implement their security policy. The
show that there exist mixed ε-equilibria, with ε relatively small,
compromised user(s), say user j, pays a fixed penalty P ≥ si (for
that result in dispersion of the security levels over the entire spec-
any si), independent of the security level smin she has chosen.
trum (0, P ). However, we do not claim that the specific distribution
While very simplified, we conjecture this game is a relatively
used in the proof is a realistic characterization of user behavior; in
accurate model of the first stage of DDoS attacks that have been
fact, we believe that further work is required to provide a distribu-
carried out in practice [10].3 We defer the study of the deployment
tion function that accurately describes the mixed strategies imple-
of the attack beyond the first stage to future work. Also, we stress
Additionally, one can direct two critiques at the discussion on the
3 While this type of attack shares some similarities with worm prop-
security game we just presented. First, the discrepancies between
agation, notably searching for insecure machines [24], a worm typ-
the behavior predicted by a Nash equilibrium and that observed in
ically propagates by infecting all machines on a network that arebelow a certain, fixed, security level, which is different from our
practice may be due to an inaccurate game model, rather than from
hypothesis that only the machines with the lowest level of security
assuming a given type of equilibrium. Second, one can argue that
while the assumption of perfect rationality, as required in a pure
Nash equilibrium, is very debatable when strategies are selected by
Therefore, having an ε-equilibrium implies that, for any αi,
humans (such as in the security game), perfect rationality is a muchmore reasonable assumption in the case of automated agents. How-
ui(αi, α−i) − ui(αi, α−i) ≤ ε ,
ever, neither of these arguments invalidates our case for consider-
ing near rationality as an additional tool to improve game theoreticmodeling of networked systems.
(A + αi)(A + αi)
TCP Congestion Control
If we allow αi = 0 and αi → ∞, an ε-equilibrium can only oc-
The last case study we propose has for object to further our
cur for ε ≥ c, that is, when ε is larger than the maximum utility
case that considering near rationality is helpful in refining game-
achievable. In such a scenario, ε is so large that all players select a
theoretic models for networked systems. This third case study
value for their parameter αi at random.
relies on a game-theoretic analysis of the TCP transport protocol
Adding the assumption that variations of αi are bounded leads
[2]. Each TCP sender relies on an additive-increase-multiplicative-
to much more interesting results.5 Specifically, let us impose αi −
decrease (AIMD) algorithm to adjust its sending rate in function of
αi ≤ K for K ∈ N. For simplicity, let us set the initial values for
the congestion experienced on the path from sender to receiver. αi to the default value in TCP implementations, that is, αi = 1 for
In [2], Akella et al. present a game-theoretic analysis to model
all i. Then, we have A = n − 1 and 0 ≤ αi ≤ K + 1. Substituting
competition between different TCP senders for three of the most
in Eq. (2), we have a ε-equilibrium as soon as
popular variants of TCP, namely, TCP Tahoe, TCP Reno and TCP
SACK. In the TCP Game they describe, players are the TCP sources
(i ∈ {1, . . . , n}), which are allowed to adjust their individual ad-ditive increase (αi) and multiplicative decrease (βi) parameters. In
Hence, in a network with a large number of TCP senders, the de-
the TCP Game, the utility of each player is equal to her goodput,
fault TCP implementation can be an ε-equilibrium for small values
which is defined as the total amount of data transfered over a time
of ε. This is one of the possible explanations why the predicted
interval, minus the amount of data that had to be retransmitted (pre-
Nash behavior that all users would turn off TCP congestion control
sumably because of losses in the network) over the same time in-
One of the insights presented in [2] is that, for TCP SACK, a pure
DISCUSSION
Nash equilibrium results in αi → ∞ (infinite additive increase) if
We have shown through three case studies that considering com-
βi is held fixed, while βi → 1 (no multiplicative decrease) if αi is
petitive equilibria of a more general form than pure Nash equilibria
held fixed. Simply stated, if all players in a TCP SACK network
can be beneficial in systems research. In particular, we discussed
were behaving according to a Nash equilibrium, they would simply
how allowing players to slightly deviate from their optimal utility
turn off congestion control, which would likely result in the net-
can help reconcile game-theoretic models and observed player be-
work suffering from complete congestion collapse. However, TCP
SACK is increasingly deployed on the Internet [4], and yet, we
The first case study on network formation showed how slightly
do not observe congestion collapse phenomena due to misbehaving
relaxing the assumption that the players are perfectly rational was
useful in assessing the sensitivity of a game theoretic model to
One of the possible reasons proposed by the authors of [2] for
small perturbations, thereby helping to evaluate its likelihood to
the continued stable operation of the Internet is that a given user
be a realistic model. The second case study on the implementation
may face technical difficulties to modify the behavior of her ma-
of security policies showed how the interaction of uncertainties in
chine to behave greedily. We submit this potential explanation can
the decision making process and the payoff evaluation could be
be partially captured by considering an ε-equilibrium instead of a
used to explain empirical behavior. The third case study on TCP
Nash equilibrium. The cost of modifying the behavior of a given
congestion control showed how combining refinements to a model
machine can indeed be viewed as a switching cost, to be included
description with a relaxation of the assumptions in force by em-
ploying a more generalized equilibrium concept can improve the
For simplicity, we assume here that players can only modify their
match between the (analytically) predicted outcome and the (em-
additive increase parameter αi. (An analogous study can be carried
out if we allow changes to βi.) The authors of [2] show that, with
From a system design perspective, we note that, even in games
TCP SACK, player i’s utility (goodput) is given by
in which the actions of each player resulting in a pure Nash equilib-
rium are undesirable from the system designer’s perspective, near
rational players may actually settle for a desirable outcome. This is
a possible explanation why the Internet does not suffer from con-
where c denotes the total capacity (bandwidth-delay product di-
gestion collapse, despite the inefficiency of the Nash equilibrium
vided by the round-trip-time) of the bottleneck link, and
in the TCP SACK game. Conversely, potentially desirable out-
comes associated with a Nash equilibrium may prove difficult to
reach unless all players are perfectly rational. The security game
5Note that there are several possible justifications for bounding the
variations on αi. For instance, because obtaining perfect knowl-
4 In fact, the authors of [2] point out that the Nash equilibria for TCP
edge of the state of the entire network is difficult (or impossible)
NewReno and TCP SACK are similar. TCP NewReno and TCP
for a given user, each user may instead incrementally probe the net-
SACK combined currently account for an overwhelming majority
work to discover her optimal setting for αi. Such a probing behav-
of all traffic on the Internet, which hints that the observed stable
ior can be captured as a repeated game where, for each repetition,
operation of the Internet probably does not result from having a
αi − αi ≤ K. This type of model thus presents some similarities
mix of different TCP variants in the network.
with the learning behavior that is thoroughly studied in [14].
we described presents an instance of such a phenomenon. Thus, it
[7] B.-G. Chun, R. Fonseca, I. Stoica, and J. Kubiatowicz.
appears that taking into account uncertainty factors can be useful in
Characterizing selfishly constructed overlay networks. In
both game specification and mechanism design. Proc. IEEE INFOCOM’04, Hong Kong, Mar. 2004.
An alternative to modeling near rationality is to refine the game
[8] Cisco Secure Consulting. Vulnerability statistics report.
specification, to capture all factors with any conceivable influence
on the game outcome. However, we argue that the two approaches
are not exclusive. In fact, as shown in the first case study, refine-
[9] B. Cohen. Incentives build robustness in BitTorrent. In Proc.
ments to the game description are probably of interest when the
1st Workshop on Econ. of Peer-to-Peer Syst., Berkeley, CA,
near rationality assumption yields substantial deviations from the
outcome predicted by a Nash equilibrium. Research on bounded-
[10] D. Dittrich. The DoS project’s “trinoo” distributed denial of
reasoning and bounded-optimality models [28] provides a solid
service attack tool, Oct. 1999. Available from
As a follow-up on our case studies, we are interested in gathering
experimental data, through user surveys, on how security levels are
[11] A. Fabrikant, A. Luthra, E. Maneva, C. Papadimitriou, and
chosen in practice, and in investigating how well this data can be
S. Shenker. On a network creation game. In Proc. ACM
described using game-theoretic models. We are also planning on
PODC’03, pages 347–351, Boston, MA, July 2003.
conducting simulation studies to assess the actual impact of uncer-
[12] M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law
tainties and of mixed strategies on network formation.
relationships of the Internet topology. In Proc. ACM
Last, we believe that this research has uncovered a few open
SIGCOMM’99, pages 251–262, Boston, MA., Aug. 1999.
problems that may warrant future investigation. First, our case
[13] J. Feigenbaum and S. Shenker. Distributed algorithmic
studies seem to show that considering other types of equilibria be-
mechanism design: Recent results and future directions. In
sides Nash equilibria can help expand the applicability of game-
Proc. DIAL-M’02, pages 1–13, Atlanta, GA, Sept. 2002.
theoretic models to networked systems. While the ε-equilibriumused in this paper is an interesting tool, many other equilibrium
[14] E. Friedman and S. Shenker. Learning and implementation
models have been investigated in the literature, e.g., [3, 16, 23].
on the Internet. Working paper. Available from http://
We conjecture that different types of equilibrium may be appropri-
ideas.repec.org/p/rut/rutres/199821.html,
ate for different networking problems, and believe that providing
a classification of networking problems according to the specific
[15] J. Goeree and C. Holt. Ten little treasures of game theory and
types of equilibrium that best characterize them would be valuable.
ten intuitive contradictions. Amer. Econ. Rev.,
More generally, one can also ask how a game-theoretic model
can capture that the rationality of each participant may vary across
[16] J. Goeree and C. Holt. A model of noisy introspection.
users: some users may be obedient, some others may be fully ratio-
Games Econ. Behav., 46(2):365–382, Feb. 2004.
nal, some may be faulty [13]. Finding if and how game-theoretical
[17] P. Haile, A. Hortac¸su, and G. Kosenok. On the empirical
models can accommodate heterogeneous populations of players may
content of quantal response equilibrium. Cowles Foundation
help us design better systems, and certainly poses a number of in-
Discussion Paper Series, (1432), Aug. 2003.
[18] G. Hardin. The tragedy of the commons. Science,
ACKNOWLEDGMENTS
[19] H.-Y. Hsieh and R. Sivakumar. Performance comparison of
cellular and multi-hop wireless networks: A quantitative
This work is supported in part by the National Science Founda-
study. In Proc. ACM SIGMETRICS’01, pages 113–122,
tion through grants ANI-0085879 and ANI-0331659. We thank the
anonymous reviewers for their insightful comments, which greatly
[20] M. Jackson and A. Wolinsky. A strategic model for social
and economic networks. J. Econ. Theory, 71(1):44–74, Oct. 1996. REFERENCES
[21] P. Klemperer. Using and abusing economic theory. J. Europ.Econ. Assoc., 1(2/3):272–300, April-May 2003.
[1] E. Adar and B. Huberman. Free riding on Gnutella. First
[22] D. McFadden. Econometric analaysis of qualitative response
models. In Z. Grilliches and M. Intriligator, editors,
[2] A. Akella, S. Seshan, R. Karp, S. Shenker, and
Handbook of Econometrics, volume II, pages 1396–1456.
C. Papadimitriou. Selfish behavior and stability of the
Elsevier, Amsterdam, Netherlands, 1984.
Internet: A game-theoretic analysis of TCP. In Proc. ACM
[23] R. McKelvey and T. Palfrey. Quantal response equilibria for
SIGCOMM’02, pages 117–130, Pittsburgh, PA, Aug. 2002.
normal form games. Games Econ. Behav., 10(1):6–38, July
[3] G. Akerlof and J. Yellen. Can small deviations from
rationality make significant differences to economic
[24] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford,
equilibria? Amer. Econ. Rev., 75(4):708–720, Sept. 1985.
and N. Weaver. Inside the Slammer worm. IEEE Security
[4] M. Allman. A web server’s view of the transport layer. ACMand Privacy, 1(4):33–39, July 2003. Comp. Comm. Rev., 30(5):10–20, Oct. 2000.
[25] J. Nash. Non-cooperative games. Annals of Mathematics,
[5] M. Baye and J. Morgan. Price dispersion in the lab and on
the Internet: Theory and evidence. RAND J. Econ., 35(3),
[26] C. Papadimitriou. Algorithms, games and the Internet. In
Proc. ACM STOC’01, pages 749–753, Heraklion, Crete,
[6] N. Christin and J. Chuang. On the cost of participating in a
peer-to-peer network. In Proc. IPTPS’04, San Diego, CA,
[27] R. Radner. Collusive behavior in noncooperative
epsilon-equilibria of oligopolies with long but finite lives. J.PROOFS OF PROPOSITIONS 3 AND 4 Econ. Theory, 22:136–154, 1980.
We first consider that users are only allowed pure strategies, and
[28] S. Russell and D. Subramanian. Provably bounded-optimal
agents. J. Artif. Intel. Res., 2:575–609, May 1995.
PROOF OF PROPOSITION 3. Without loss of generality, we as-
[29] S. Shenker. Making greed work in networks: A
sume that users {1, . . . , k}, with 1 ≤ k ≤ n, choose a security
game-theoretic analysis of switch service disciplines. IEEE/ACM Trans. Networking, 3(6):819–831, Dec. 1995.
min < si for all i ∈ {k + 1, . . . , n}. Thus, each user i for
i ∈ {1, . . . , k} is compromised, and has a utility ui = −P . Users
[30] J. Shneidman and D. Parkes. Rationality and self-interest in
in i ∈ {k + 1, . . . , n} cannot be compromised because si > smin
peer-to-peer networks. In Proc. IPTPS’03, pages 139–148,
and therefore have a utility ui = −si.
Suppose a user i in {1, . . . , k} were to increase her security level
to si = smin +h for h > 0. User i’s utility would become −smin−APPENDIX h. However, because the original constellation of security levelsforms a Nash equilibrium, we know that such a change of strategy
PROOFS OF PROPOSITIONS 1 AND 2
results in a decrease of user i’s utility for any h > 0. That is, for
Here, we first show that the fully connected network is the only
Nash equilibrium if and only if m < l/n, before showing that, if
m > l/n, the star-shaped network characterizes a Nash equilib-
smin − h + P ≤ 0 ,
which reduces to smin ≥ P − h for any h > 0, so that smin ≥P by continuity. By hypothesis, s
ROOF OF PROPOSITION 1. In a fully connected network, no
node can create additional links. If a given node i removes one of
min = P . Since for any i, smin ≤ si ≤ P , we obtain k = n,
its links, deg(i) decreases from (n − 1) to (n − 2), but, at the same
i = P is the only possible Nash equilibrium. The
time, one of the nodes i = i is now at a distance of 2 from i. Thus,
i = −P , and cannot be increased by picking
a different security level, which confirms that
Suppose now that users choose their security level probabilisti-
cally. More precisely, the probability that user i picks a security
and the difference in utility for node i, between the strategy of re-
level si below a value s is characterized by the cumulative distri-
moving one link and the strategy consisting in maintaining all links,
is m − l/n. To have a pure Nash equilibrium, we therefore need to
i (s) = P r[si ≤ s].
have m − l/n ≤ 0, which is true if and only if m ≤ l/n.
PROOF OF PROPOSITION 4. Consider the following continuous
Suppose now that we have m < l/n, and a network that is not
fully connected. In particular, consider that a node i can decide
whether to create a link to another node i = i. Before addition of
the link i → i , i is at a distance 2 ≤ di,i ≤ n − 1 of i. After
creation of the link i → i , i is at a distance 1 of i. Thus, by creat-
ing the link i → i , Edi,j at least decreases by (2 − 1)/n = 1/n.
We use Eui(s) to denote the expected value of the utility ui(s) in
Adding the link i → i also results in deg(i) increasing by one, so
function of a security level s. Because ui(s) = −P if all users j =
that the addition of the link i → i eventually results in a change
i choose security levels higher than s, and ui(s) = −s otherwise,
in the node i’s utility equal to −m + l/n, which, by hypothesis, is
strictly positive. Hence, node i always has an incentive to add linksto nodes it is not connected to. Using the same reasoning for all
Eui(s) = −P (P r[sj > s])n−1 − s(1 − (P r[sj > s])n−1) ,
nodes, we conclude that the fully connected network is the unique
which can be expressed in terms of F
Nash equilibrium if m < l/n. Eui(s) = −P (1 − Fsi (s))n−1 − s(1 − (1 − Fsi(s))n−1) . (4)
Consider now a star-shaped network, where all links connect to
or from a central node, say node 0, and assume that m > l/n.
Substituting Fsi (s) by its expression given in Eq. (3), Eq. (4) re-duces to
PROOF OF PROPOSITION 2. Node 0 is fully connected to the
rest of the network, and therefore cannot create additional links. If
Eui(s) = −P + s
node 0 removes one of its links, one of the n − 1 other nodes be-
A study of the variations of Eui(s) in function of s ∈ [0, P ] indi-
comes unreachable, which implies Ed0,j → ∞, and u0 → −∞.
cates that Eui(s) ≥ Eui(0) = −P and that Eui(s) ≤ Eui(P/2),
Thus, node 0 has no incentive in modifying its set of links. Like-
with Eui(P/2) = −3P/4. Thus, if we have ε = P/4, any vari-
wise, peripheral nodes do not remove their (only) link to the central
ation of the expected utility is smaller ε, which characterizes an
node, to avoid having their utility ui → −∞. ε-equilibrium. In other words, we have shown, by providing a
Suppose now that a peripheral node i creates an additional link to
another peripheral node i = i. An argument identical to that used
i (s), that there exist ε-equilibria with ε ≤ P/4
where the security levels si can be spread out over the entire in-
in the proof of Proposition 1 shows that the addition of the link
terval [0, P ]. Note that we only present an existence proof here. i → i results in a change in the node i’s utility equal to −m + l/n.
It is unclear whether the chosen c.d.f Fs
Here, however, m > l/n, so that −m+l/n < 0, and node i has no
i (s) is an accurate depic-
tion of how security levels are chosen in reality, and it is likewise
incentive in adding the link i → i . Thus, the star-shaped network
entirely possible that there exist other distributions of the security
is a pure Nash equilibrium, which may not be unique.
levels over [0, P ] that result in ε-equilibria for ε
Toronto Police Association (TPA) Toronto Police Services (TPS) AND IN THE MATTER OF AN ACCOMMODATION GRIEVANCE DATED DECEMBER 4, 2003 OF Tim Hill Kevin Whitaker, Sole Arbitrator Appearances for the TPA Beth Symes, Counsel Tim Hill, grievor Appearances for the TPS Glenn Christie, Counsel and others Hearings were held in Toronto commencing on January 31, 2006 and completed on May 16, 20
Learning Unit: Fever 1793 or 2009? Discussion Guide, Activities Talk About It What was Philadelphia like in 1793? What were the advantages and disadvantages of living in thecountryside outside of Philadelphia?How was the life of a 14-year-old in 1793 different from the life of a 14-year-old today? In whichperiod would you rather live? Why?What are the greatest advancements American soc