Preview

Game Theory Intro

Satisfactory Essays
Open Document
Open Document
278 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Game Theory Intro
.

Game Theory Intro
Game Theory Course:
Jackson, Leyton-Brown & Shoham

Game Theory Course: Jackson, Leyton-Brown & Shoham

Game Theory Intro

.

.

TCP Backoff Game

Game Theory Course: Jackson, Leyton-Brown & Shoham

Game Theory Intro

.

.

TCP Backoff Game

Should you send your packets using correctly-implemented TCP
(which has a “backoff” mechanism) or using a defective implementation (which doesn’t)?

Game Theory Course: Jackson, Leyton-Brown & Shoham

Game Theory Intro

.

.

TCP Backoff Game

Should you send your packets using correctly-implemented TCP
(which has a “backoff” mechanism) or using a defective implementation (which doesn’t)?
• This problem is an example of what we call a two-player game:
• both use a correct implementation: both get 1 ms delay
• one correct, one defective: 4 ms for correct, 0 ms for defective
• both defective: both get a 3 ms delay.
Game Theory Course: Jackson, Leyton-Brown & Shoham

Game Theory Intro

.

.

TCP Backoff Game
• This problem is an example of what we call a two-player game:
• both use a correct implementation: both get 1 ms delay
• one correct, one defective: 4 ms for correct, 0 ms for defective
• both defective: both get a 3 ms delay.
• Play this game: in your head; with a friend; on our online system.
• Some questions to discuss after playing:








What action should a player of the game take?
Would all users behave the same in this scenario?
What global behavior patterns should a system designer expect?
For what changes to the numbers would behavior be the same?
What effect would communication have?
Repetitions? (finite? infinite?)
Does it matter if I believe that my opponent is rational?

Game Theory Course: Jackson, Leyton-Brown & Shoham

Game Theory Intro

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The client accept the connection and send data to server and the server to replay the…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NETW 310 iLab week 2

    • 335 Words
    • 2 Pages

    6. What is the most critical part of the termination procedure to ensure low crosstalk on the connection?…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    7. Find a TCP 3-way handshake for a TELNET session. What is the significance of the TCP 3-way handshake?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    3. What is used by TCP to establish a session between two systems? 69, 121…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Define client/server computing, packet switching, and TCP/IP. Explain how these three things make the Internet so powerful and robust.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Host B sends a FIN packet to Host A indicating the data transmission is complete.…

    • 890 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Read questions 80 and 81 on pp. 274-275 of the text. Identify the problems with the TCP/IP network in each scenario and complete the table. Explain your answer for each of the scenarios.…

    • 328 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Discrete Mathematics

    • 954 Words
    • 4 Pages

    Part III: Create a tree that models the following scenario. A player decides to play a maximum of 4 times, betting on red each time. The player will quit after losing twice. In the tree, any possible last plays will be an ending point of the tree. Branches of the tree should indicate the winning or losing, and how that affects whether a new play is made.…

    • 954 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mr President Game Analysis

    • 1368 Words
    • 6 Pages

    To hold the position of President of the United States of America is a highly honored task. Every four years, someone new and possibly not seen before in politics has the shot at becoming the next President. It is very important for people to understand how this process works, and be inside the thoughts and decisions that a candidate must make to reach Capitol Hill. Thanks to the people at 3M, the presidential campaign can be simulated through the complex, yet easy to understand, board game, Mr. President: The Game of Campaign Politics. Recently in class, we ran the simulation/game. One game in particular, between Nathan Allen (R) and J.C. Reese (D) involved some strategy and number crunching. Which candidate/player used the better strategy?…

    • 1368 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Rasmusen, E. (2000). Games and Information: an Introduction to Game Theory. 3rd ed. Oxford: Basil Blackwell.…

    • 1513 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Esmaeli, M., Aryanezhad, M., & Zeephongsekui, P. (2009). A game theory approach in seller-buyer supply chain. European Journal of Operational Research, 195 (2), 442-448.…

    • 1515 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Tcpip

    • 1696 Words
    • 7 Pages

    From what we know about TCP/IP, it consist of two layers , which is the TCP and IP. Talking about TCP protocol, it is responsible for verifying the correct delivery of data from client to server. In the intermediate network, data can be lost. With this, TCP can adds support to detect errors or lost data to trigger retransmission until the data is correctly and completely received. On the other hand, IP protocol handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though we can see some of the packets from the same message are routed differently than the others, they will be reassembled at the destination.…

    • 1696 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cnt5106C Computer Networks

    • 2863 Words
    • 12 Pages

    CNT5106C Computer Networks, Summer 2010 Instructor: Prof. Ahmed Helmy Homework #1 On the Internet Architecture, Elementary Queuing Theory and Application Layer I. Internet and layered protocol architecture: Q1. (5 points) In the layered protocol architecture the transport layer functionality includes congestion control and error recovery (e.g., retransmission). One suggested that this functionality should be done strictly at the end points (i.e., at the hosts) without aid from the network. Do you agree? Why? Elaborate showing the design trade-offs. Answer: (5 points) In general, error recovery (e.g., re-transmission) is specific to application needs. Some applications require 100% packet recovery, even with delays and jitters (such as TCP-based applications, http, ftp and telnet traffic). Other applications may be tolerant to loss but less tolerant to delays and jitter, such as voice applications. Re-transmissions and packet recovery add to the jitters and the delays and hence may not be desirable for realtime or voice applications. Hence it is not a good idea, in general, to include error recovery at the network layer (that is not aware of application needs) and it is better to implement such functionality at the transport layer end-to-end. In cases of lossy channels in the network (such as X.25 in the early networking days, or wireless links) it may be desirable to reduce the bit error rates on those links by including error recovery at the end points of those links. [In general, most links nowadays have very low BER, and for wireless links the MAC (such as IEEE 802.11) layer provides Ack’ed delivery]. For congestion control, a similar argument may be given. That is, congestion reaction may be application specific and is better implemented end-to-end. Congestion notification, on the other hand, may provide useful information to the end points to react appropriately. Since losses in the network may be due to congestion or other factors, a signal from the network…

    • 2863 Words
    • 12 Pages
    Good Essays

Related Topics