Nikhil Gopinath Shetty

EECS Department, University of California, Berkeley

Technical Report No. UCB/EECS-2010-91

June 4, 2010

http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-91.pdf

First, this thesis studies user incentives for the adoption of femtocells or home base stations and their resulting impact on network operator revenues. The thesis develops a model of a monopolist network operator who offers the option of macrocell access or macro+femtocell access to a population of users who possess linear valuations for the data throughput. The study compares the revenues from two possible spectrum schemes for femtocell deployment; the split spectrum scheme, where femtocells and macrocells operate on different frequencies and do not interfere, and the common spectrum scheme, where they operate on the same frequencies (partially or fully) and interfere. The results suggest that the common spectrum scheme that creates heavy interference for the macrocell still performs comparably to the split spectrum scheme for revenue maximization. This suggests that the common spectrum scheme with good interference management may be the pathway to better femtocell adoption. Second, the thesis investigates the impact of the provision of two classes of service in the Internet on the surplus distribution between users and providers. The study considers multiple competing Internet Service Providers (ISPs) who offer network access to a fixed user base, consisting of end-users who differ in their quality requirements and willingness to pay for the access. User-ISP interactions are modeled as a game in which each ISP makes capacity and pricing decisions to maximize his prots and the end-users only decide which service to buy (if any) and from which ISP. The model provides pricing for networks with single- and two-service classes for any number of competing ISPs. The results indicate that multiple service classes are socially desirable, but could be blocked due to the unfavorable distributional consequences that it inflicts on the existing Internet users. The research proposes a simple regulatory tool to alleviate the political economic constraints and thus make multiple service classes in the Internet feasible. The third topic is a problem involving missing markets for cyber-security insurance. The study explains why insurance markets for Internet security fail to take off due to a number of factors including information asymmetry, efficiency losses due to network externalities and competition. The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technology-based defenses. The research investigates how competitive cyber-insurers affect network security and user welfare. The model explores a general setting, where the network is populated by identical users with arbitrary risk-aversion and network security is costly for the users. The user's probability to incur damage (from being attacked) depends on both his security and the network security. First, the model considers cyber-insurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. If an equilibrium exists, network security is always worse relative to the no-insurance equilibrium. Though user utility may rise due to a coverage of risks, total costs to society go up due to higher network insecurity. Second, the study considers insurers with full information about their users' security. Here, user security is perfectly enforceable (zero cost). Each insurance contract stipulates the required user security and covers the entire user damage. Still, for a significant range of parameters, network security worsens relative to the no-insurance equilibrium. Thus, although cyber-insurance improves user welfare, in general, competitive cyber-insurers may fail to improve network security.

Advisors: Jean Walrand


BibTeX citation:

@phdthesis{Shetty:EECS-2010-91,
    Author= {Shetty, Nikhil Gopinath},
    Title= {Design of Network Architectures: Role of Game Theory and Economics},
    School= {EECS Department, University of California, Berkeley},
    Year= {2010},
    Month= {Jun},
    Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-91.html},
    Number= {UCB/EECS-2010-91},
    Abstract= {First, this thesis studies user incentives for the adoption of femtocells or home base stations
and their resulting impact on network operator revenues. The thesis develops a model of
a monopolist network operator who offers the option of macrocell access or macro+femtocell
access to a population of users who possess linear valuations for the data throughput. The
study compares the revenues from two possible spectrum schemes for femtocell deployment;
the split spectrum scheme, where femtocells and macrocells operate on different frequencies
and do not interfere, and the common spectrum scheme, where they operate on the same
frequencies (partially or fully) and interfere. The results suggest that the common spectrum
scheme that creates heavy interference for the macrocell still performs comparably to
the split spectrum scheme for revenue maximization. This suggests that the common spectrum
scheme with good interference management may be the pathway to better femtocell
adoption.
Second, the thesis investigates the impact of the provision of two classes of service in
the Internet on the surplus distribution between users and providers. The study considers
multiple competing Internet Service Providers (ISPs) who offer network access to a fixed
user base, consisting of end-users who differ in their quality requirements and willingness to
pay for the access. User-ISP interactions are modeled as a game in which each ISP makes
capacity and pricing decisions to maximize his prots and the end-users only decide which
service to buy (if any) and from which ISP. The model provides pricing for networks with
single- and two-service classes for any number of competing ISPs. The results indicate that
multiple service classes are socially desirable, but could be blocked due to the unfavorable
distributional consequences that it inflicts on the existing Internet users. The research proposes
a simple regulatory tool to alleviate the political economic constraints and thus make
multiple service classes in the Internet feasible.
The third topic is a problem involving missing markets for cyber-security insurance. The
study explains why insurance markets for Internet security fail to take off due to a number
of factors including information asymmetry, efficiency losses due to network externalities
and competition. The interdependent nature of security on the Internet causes a negative
externality that results in under-investment in technology-based defenses. The research
investigates how competitive cyber-insurers affect network security and user welfare. The
model explores a general setting, where the network is populated by identical users with
arbitrary risk-aversion and network security is costly for the users. The user's probability to
incur damage (from being attacked) depends on both his security and the network security.
First, the model considers cyber-insurers who cannot observe (and thus, affect) individual
user security. This asymmetric information causes moral hazard. If an equilibrium exists,
network security is always worse relative to the no-insurance equilibrium. Though user
utility may rise due to a coverage of risks, total costs to society go up due to higher network
insecurity. Second, the study considers insurers with full information about their users'
security. Here, user security is perfectly enforceable (zero cost). Each insurance contract
stipulates the required user security and covers the entire user damage. Still, for a significant 
range of parameters, network security worsens relative to the no-insurance equilibrium. Thus,
although cyber-insurance improves user welfare, in general, competitive cyber-insurers may
fail to improve network security.},
}

EndNote citation:

%0 Thesis
%A Shetty, Nikhil Gopinath 
%T Design of Network Architectures: Role of Game Theory and Economics
%I EECS Department, University of California, Berkeley
%D 2010
%8 June 4
%@ UCB/EECS-2010-91
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-91.html
%F Shetty:EECS-2010-91