Please wait a minute...
JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE)
Service Computing     
Evolutionary game analysis on cooperative behaviors of  internet service providers
ZHANG Xin-xin, XU Ke, ZHONG Yi-Feng, SU Hui
Department of Computer Science and Technology,Tsinghua University,Beijing 100084, China
Download:   PDF(1284KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  An evolutionary game scheme of connection relationships was designed based on cooperation behaviors in order to promote efficient cooperation among internet service providers (ISPs) and allocate network infrastructure resources reasonably. The connection strategies were conducted among ISP groups Through analyzing the payment structure between stakeholders in the communication market like internet content providers (ICPs) and ISPs. Furthermore,a comprehensive economic utility analysis was proposed under the condition of limited rationality. Finally, the results demonstrate that when the group of ISPs is at evolutionary stable state (ESS),it is composed of small groups which share the same preference of interests. The control of costs and the allocation mechanism of profits have significant influence on the stable state of groups. The government could carry out measures like subsidy or punishment to reallocate network infrastructure resources dynamically.

Published: 11 June 2017
CLC:  TP 393  
Cite this article:

ZHANG Xin-xin, XU Ke, ZHONG Yi-Feng, SU Hui. Evolutionary game analysis on cooperative behaviors of  internet service providers. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1214-1224.


网络服务提供商合作行为的演化博弈分析

为了促进网络服务提供商之间的有效合作并合理分配资源,设计一种基于网络服务提供商之间连接关系的合作行为演化博弈方法,通过分析网络内容提供商与服务提供商之间的支付结构,得到服务提供商之间的连接策略,进而从有限理性的角度对所提方案进行综合经济效用分析,最后解释均衡结果,即在演化博弈过程中网络服务提供商之间的合作策略随关键变量如何变化.结果表明:当网络服务提供商群体处于稳定状态时,由很多利益偏好相似的小团体构成,成本控制和利润分配机制对群体的稳态有显著影响,政府或监管机构可以通过补贴或惩罚措施动态调配网络基础设施.

参考文献(References):
[1] FRIEDMAN D. On economic applications of evolutionary game theory [J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
[2] FRIEDMAN D. Towards evolutionary game models of financial markets [J].Quantitative Finance, 2001,1(1): 177-185.
[3] HOFBAUER J, SIGMUND K. Evolutionary gamedynamics [J]. Bulletin of the American MathematicalSociety, 2003, 40(4): 479-519.
[4] FARATIN P, CLARK D, BAUER S, et al. Complexity of Internet interconnections: technology, incentives and implications for policy [J/OL]. The 35th Research Conference on Communication, Information and Internet Policy (TPRC), 2007. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2115242.
[5] MA R, CHIU D, LUI J, et al. On cooperative settlement between content, transit, and eyeball internet service providers [J]. IEEE/ACM Transactions on networking, 2011, 19 (3): 802-815.
[6] BAILEY J P. The economics of Internet interconnectionagreements[J].Internet Economics, 1997, 35: 155-168.
[7] HUSTON G. ISP survival guide: strategies for running a competitive ISP[M]. New Jersey: John Wiley & Sons,Inc.,1998.
[8] SHAKKOTTAI S, SRIKANT R. Economics of network pricing with multiple ISPs [J].IEEE/ACM Transactions On Networking, 2006, 14(6): 1233-1245.
[9] MA R T B, LEE S, LUI J, et al. Incentive and service differentiation in P2P networks: a game theoretic approach [J]. IEEE/ACM Transactions on Networking (TON), 2006, 14(5): 978-991. 
[10]SU H, XU K, SHEN M, et al. Research on mobile data subsidy model and case study [J].Journal of Computer Research and Development, 2016,53(4): 861-872.
[11]  XU K, ZHONG Y, HE H. Can P2P technology benefit eyeball ISPs? A cooperative profit distribution answer[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 2783-2793.
[12] 张春燕,徐恪,王保进,等. 多接口移动主机最优化费用和性能方法研究\[J\]. 计算机学报,2011,34(11):2173-2186.
[13] MACKIEMASON J K, VARIAN H R. Pricing the Internet, Public access to the Internet [J]. PrenticeHall, 1995, pp. 269-314.
[14] SEMRET N, LIAO R R F, CAMPBELL A T, et al. Pricing, provisioning and peering: dynamic markets for implications for network interconnections[J]. IEEE journal on selected areas in communications, 2000,18(12): 2499-2513.
[15] FRIEDMAN D. Evolutionary economics goes mainstream: a review of the theory of learning in games[J]. Journal of Evolutionary Economics, 1998, 8(4): 423-432.
[1] Yi-xuan ZHANG,Jian GONG. Multi-layer domain name detection and measurement based on DNS traffic[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(12): 2423-2429.
[2] Hai-xiu CHENG,Guan-lin LI,Ling ZHANG. Dynamic resource reservation algorithm for core network video business with bandwidth reduction based on time slot[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(9): 1746-1752.
[3] Dong LI,Yu LU,Jun-qing YU. Security of source address validation improvement binding table in software defined network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1543-1549.
[4] Qiu-yun WU,Wei DING. Analysis of Internet scanning behavior based on dynamic dark network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1550-1556.
[5] Ping QI,Hong SHU. Task offloading strategy considering terminal mobility in medical wisdom scenario[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(6): 1126-1137.
[6] Yi-han LUO,Jie-ren CHENG,Xiang-yan TANG,Ming-wang OU,Tian WANG. Early warning model of DDoS attack situation based on adaptive threshold[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 704-711.
[7] Wei CHEN,Xue-jiao LIU,Ying-jie XIA. Multi-factor reputation evaluation model based on analytic hierarchy process in vehicle Ad-hoc networks[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 722-731.
[8] YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1181-1189.
[9] LI Jian-li, DING Ding, LI Tao. Multi-objective hybrid cloud task scheduling using twice clustering[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1233-1241.
[10] WANG Yu-xiang, LI Sheng-jie, WANG Hao, MA Jun-yi, WANG Ya-sha, ZHANG Da-qing. Survey on Wi-Fi based contactless activity recognition[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 648-654.
[11] QIAN Liang-fang, ZHANG Sen-lin, LIU Mei-qin. Reservation-based MAC protocol for underwater wireless sensor networks with data train[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 691-696.
[12] LI Xiao-dong, ZHU Yue-fei, LIU Sheng-li, XIAO Rui-qing. Permission-based Android application security evaluation method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 590-597.
[13] HUANG Yan, WANG Peng, XIE Gao hui, AN Jun xiu. Data center energy cost optimization in smart grid: a review[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(12): 2386-2399.
[14] YU Yang,XIA Chun he,YUAN Zhi chao,LI Zhong. Trust bootstrapping model for computer network collaborative defense system[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(9): 1684-1694.
[15] QI Ping, LI Long shu, LI Xue jun. Cloud resource scheduling algorithm with failure recovery mechanism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(12): 2305-2315.