Skip to main content
Log in

Strategic Network Formation Through an Intermediary

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

Settings in which independent self-interested agents form connections with each other are extremely common, and are usually modeled using network formation games. We study a natural extension of network formation games in which the nodes cannot form connections themselves, but instead must do it through an intermediary, and must pay the intermediary to form these connections. The price charged by the intermediary is assumed to be determined by its operating costs, which in turn depend on the total amount of connections it facilitates. We investigate the existence and worst-case efficiency (price of anarchy) of stable solutions in these settings, and especially when the intermediary uses common pricing schemes like proportional pricing or marginal cost pricing. For both these pricing schemes we prove existence of stable solutions and completely characterize their structure, as well as generalize these results to a large class of pricing schemes. Our main results are on bounding the price of anarchy in such settings: we show that while marginal cost pricing leads to an upper bound of only 2, i.e., stable solutions are always close to optimal, proportional pricing also performs reasonably well as long as the operating costs of the intermediary are not too convex.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Ager, B., Chatzis, N., Feldmann, A., Sarrar, N., Uhlig, S., Willinger, W.: Anatomy of a large european IXP. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 163–174. ACM (2012)

  2. AMS-IX: Amsterdam internet exchange pricing. https://ams-ix.net/services-pricing/pricing (2015)

  3. Anshelevich, E., Hoefer, M.: Contribution games in networks. Algorithmica 63(1-2), 51–90 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  4. Augustin, B., Krishnamurthy, B., Willinger, W.: IXPs: mapped?. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, pp. 336–349. ACM (2009)

  5. Bala, V., Goyal, S.: A noncooperative model of network formation. Econometrica 68(5), 1181–1229 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  6. Calvó-Armengol, A., Ilkilic, R.: Pairwise-stability and nash equilibria in network formation. Int. J. Game Theory 38(1), 51–79 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  7. Cardona Restrepo, J.C., Stanojevic, R.: IXP traffic: a macroscopic view. In: Proceedings of the 7th Latin American Networking Conference, pp. 1–8. ACM (2012)

  8. Corbo, J., Parkes, D.: The price of selfish behavior in bilateral network formation. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, pp. 99–107. ACM (2005)

  9. Cormen, T.H.: Introduction to algorithms. MIT Press, Cambridge (2009)

    MATH  Google Scholar 

  10. DEC-IX: German internet exchange pricing. https://www.de-cix.net/products-services/pricing/ (2015)

  11. Derks, J., Kuipers, J., Tennekes, M., Thuijsman, F.: Local dynamics in network formation. In: Proceedings of 3rd World Congress of the Game Theory Society (2008)

  12. Dhamdhere, A., Dovrolis, C.: The internet is flat: modeling the transition from a transit hierarchy to a peering mesh. In: Proceedings of the 6th International Conference, p. 21. ACM (2010)

  13. Dutta, B., Ghosal, S., Ray, D.: Farsighted network formation. J. Econ. Theory 122(2), 143–164 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  14. Epstein, A., Feldman, M., Mansour, Y.: Strong equilibrium in cost sharing connection games. In: Proceedings of the 8th ACM Conference on Electronic Commerce, pp. 84–92. ACM (2007)

  15. EuroIX: European internet exchange association: Starting an IXP – infrastructure and equipment. https://www.euro-ix.net/starting-an-ixp (2015)

  16. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C.H., Shenker, S.: On a network creation game. In: Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing, pp. 347–351. ACM (2003)

  17. Jackson, M.O.: A survey of network formation models: stability and efficiency. Group Formation in Economics: Networks, Clubs, and Coalitions pp. 11–49 (2005)

  18. Jackson, M.O., Wolinsky, A.: A strategic model of social and economic networks. J. Econ. Theory 71(1), 44–74 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  19. Johari, R.: The price of anarchy and the design of scalable resource allocation mechanisms. Algorithmic Game Theory pp. 543–568 (2007)

  20. Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: STACS 99, pp. 404–413. Springer (1999)

  21. LINX: London internet exchange service fees. https://www.linx.net/service/servicefees.html (2015)

  22. Page, F., Resende, J.: Network formation games. http://kenticoqa.uwb.edu/getattachment/business/about/research-series/network-formation-games-uwb.pdf (2013)

  23. Papadimitriou, C.: Algorithms, games, and the internet. In: Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, pp. 749–753. ACM (2001)

  24. Ryan, P.S., Gerson, J.: A primer on internet exchange points for policymakers and non-engineers http://ssrn.com/abstract=2128103 (2012)

  25. Shakkottai, S., Fomenkov, M., Koga, R., Krioukov, D., Claffy, K.: Evolution of the internet as-level ecosystem. In: Complex Sciences, pp. 1605–1616. Springer (2009)

  26. Shakkottai, S., Srikant, R.: Economics of network pricing with multiple isps. IEEE/ACM Trans. Networking 14(6), 1233–1245 (2006)

    Article  Google Scholar 

  27. Tardos, E., Wexler, T.: Network formation games and the potential function method. Algorithmic Game Theory pp. 487–516 (2007)

  28. Vazirani, V.V.: Combinatorial algorithms for market equilibria. Algorithmic Game Theory pp 103–134 (2007)

  29. Watts, A.: A dynamic model of network formation. In: Networks and Groups, pp. 337–345. Springer (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elliot Anshelevich.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

A preliminary version of this paper appeared in the proceedings of IJCAI 2015. The work was partially supported by NSF awards CCF-1101495 and CNS-1218374.

Appendix: Proof of Lemma 5.3

Appendix: Proof of Lemma 5.3

Lemma 5.3

Consider an instance that achieves the worst-case PoA with intermediary price function p(⋅) and suppose that PoA > 2. Then for all pairs (ij) we have λij = λforsomeλ > 0.

Proof outline

Let τy denote min{λij : yij > 0} for a given allocation vector y, i.e., τy corresponds smallest λij that a pair with positive connection strength can have in y. In the instance that achives the worst-case PoA, let g be an allocation vector corresponding to the minimum social cost and let (f, p(f)) be a stable solution of maximum social cost. This means that the ratio SC(f)/SC(g) equals the worst-case PoA in the instance under consideration.

The proof of the Lemma 5.3 involves a series of steps: The first step (Claim 1 below) involves proving that for the instance under consideration that achieves the worst-case PoA, τgτf. The second step (Claim 2 below) involves showing that λij ∈{τg, τf} for every pair (ij). Given this, the final step (Claim 3 below) involves proving τg = τf.

The theme of all these steps is to make use of Propositions 1 and 2 to create an instance by perturbing λij values for some intelligently chosen class of pairs, while maintaining the stability of the solution (f, p(f)). Later carefully applying Lemmas 5.1 and 5.2 we show that in the newly created instance, the ratio SC(f)/SC(g) strictly increases. This contradicts our initial assumption that the original instance achieves the worst-case PoA. □

Claim 1

τgτf.

Proof

Suppose we had τf > τg on the contrary. We break the further analysis into two cases:

  1. 1.

    Case when p(f) > τg: Recall that connection cost incurred by a pair (ij) for a connection strength of yij is given by λij(Bijyij). Now we claim p(f) > τg, implies that the pairs in the class T(τg) incur strictly positive connection cost in total for the allocation vector f but incur zero connection cost for the allocation vector g. Note: recall that T(τg) is the set of all pairs with λij = τg.

    Note that p(f) > τg implies that the intermediary charges a price higher than τg in the solution (f, p(f)). Thus by the first stability condition, fij = 0 for (ij) ∈ T(τg). This, together with Lemma 5.2 implies Bij = gij for (ij) ∈ T(τg). Hence the pairs in T(τg) incur zero cost for the allocation vector g. At the same time, the definition of τg implies that at least one pair with λij = τg has gij > 0. Combining it with fij = 0 and Bij = gij (as discussed above), we get that the pairs in T(τg) incur strictly positive cost in total for the allocation vector f.

    Now let us obtain another instance by increasing λij for all the pairs in T(τg) to any fixed Λ in the open interval (p(f), τg) while Proposition 2 ensures the stability (f, p(f)). Notice that in this procedure, the connection cost of the pairs in the set T(τg) strictly increases for the allocation vector f. However as Bij = gij, they still incur zero connection cost for the allocation vector g even in the transformed instance. Thus during this transformation SC(g) does not change but SC(f) strictly increases. Thus the ratio SC(f)/SC(g) becomes strictly greater in the transformed instance, contradicting the assumption that the original instance achieves the worst-case PoA.

  2. 2.

    Case when p(f) ≤ τg (and λ1τf > τg): In this case, we claim that the following holds true

    $$ \frac{\lambda^{1}\cdot {\sum}_{(ij)\in T(\lambda^{1})} (B_{ij} - f_{ij})}{\lambda^{1}\cdot {\sum}_{(ij)\in T(\lambda^{1})} (B_{ij} - g_{ij})} \leq 2 $$
    (11)

    To see it, suppose that the following held true:

    $$ \sum\limits_{(ij)\in T(\lambda^{1})} f_{ij} \geq \sum\limits_{(ij)\in T(\lambda^{1})} g_{ij} $$
    (12)

    If the condition in (12) holds true then it trivially implies the bound in (11). Now suppose that the condition in (12) does not hold. By our assumptions, we have p(f) ≤ τg < τf < λ1. Thus the bound given in Lemma 5.1 holds true. It can be shown that the left hand side term in (11) gets maximized when the bound in Lemma 5.1 is met with equality to give us a desired upper bound of 2.

    Now if it were true that PoA > 2 then we can create another instance by reducing λ1 by a tiny 𝜖 such that 0 < 𝜖 < λ1λ2. Note that (f, p(f)) still stays a stable solution in the transformed instance by Proposition 1. However, reduction in λ1 leads to an increase in the ratio SC(f)/SC(g) by Observation 5.2. This contradicts the assumption that the original instance achieves the worst-case PoA.

Thus assuming τf > τg leads us to contradictions in both above cases. Hence it proves that τgτf. □

Claim 2

λij ∈{τf, τg} for any pair (ij).

Proof

We already know that τgτf. We also know by Lemma 5.2 that Bij = 0 whenever λij < τfτg, thus we can ignore all such pairs. We break the further analysis into two cases:

  1. 1.

    Suppose there exists a pair with λij > τg: This implies λ1 > τg. Now we claim that the following holds true

    $$\begin{array}{@{}rcl@{}} \frac{\lambda^{1}\cdot {\sum}_{(ij)\in T(\lambda^{1})} (B_{ij} - f_{ij})}{\lambda^{1}\cdot {\sum}_{(ij)\in T(\lambda^{1})} (B_{ij} - g_{ij})} \leq 2 \end{array} $$
    (13)

    To prove our claim, suppose that the following holds:

    $$ \sum\limits_{(ij)\in T(\lambda^{1})} f_{ij} \geq \sum\limits_{(ij)\in T(\lambda^{1})} g_{ij} $$
    (14)

    If the condition in (14) holds true then it trivially implies the bound in (13). Now suppose that the condition in (14) does not hold. We already know that p(f) ≤ τf from the first stability condition and the definition of τf. Combining this with our assumptions, we have p(f) ≤ τfτg < λ1, giving us p(f) < λ1. Thus the bound given in Lemma 5.1 holds true. It can be shown that the left hand side term in (13) gets maximized when the bound in Lemma 5.1 is met with equality to give us a desired upper bound of 2.

    Now if it were true that PoA > 2 then we can create another instance by reducing λ1 by a tiny 𝜖 such that 0 < 𝜖 < λ1λ2. Note that (f, p(f)) still stays a stable solution in the transformed instance by Proposition 1. However, reduction in λ1 leads to an increase in the ratio SC(f)/SC(g) by Observation 5.2. This contradicts the assumption that the original instance achieves the worst-case PoA.

  2. 2.

    Suppose there exists a pair with τg > λij > τf : Note that by definition of τg that these pairs satisfy gij = 0. Thus for these pairs, Bij = fij. Since we only allow Bij > 0 in our problem settings, we have fij > 0 for all these pairs. This implies that these pairs have zero connection cost in the allocation vector f (because of Bij = fij) but strictly positive connection cost in the allocation vector g (because of gij = 0).

    Now Consider all the pairs (uv) which satisfy the condition λuv = min{λij : τg > λij > τf}. By applying Proposition 1, we can reduce λuv of all such pairs to τf without affecting the stability of (f, p(f)). In this process, the connection cost of all these pairs stays zero in the allocation vector f but strictly decreases in the allocation vector g. Hence in this process SC(f) does not change but SC(g) strictly decreases, increasing the ratio SC(f)/SC(g) leading to a contradiction with the assumption that the original instance achieves the worst-case PoA.

This completes the proof of Claim 2. □

Claim 3

τg = τf.

Proof

We already proved above in Claim 1 and Claim 2 that in the instance I achieving worst-case efficiency we have λij ∈{τf, τg} for every pair (ij) and τgτf.

Now if τg > τf, then we can apply the analysis from case (b) of proof of the claim τgτf to prove that we can construct another instance by reducing λ1 = τg by a tiny 𝜖, while keeping (f, p(f)) stable, such that ratio SC(f)/SC(g) strictly increases in this transformation. This leads to the contradiction that the original instance could achieve the worst-case PoA hence proving our claim.

Proving Claim 3 completes the last step to prove Lemma 5.3 as discussed in the proof outline of Lemma 5.3. □

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anshelevich, E., Bhardwaj, O. & Kar, K. Strategic Network Formation Through an Intermediary. Theory Comput Syst 63, 1314–1335 (2019). https://doi.org/10.1007/s00224-018-09906-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-018-09906-8

Keywords

Navigation