Balaji Prabhakar Departments of EE and CS Stanford University

Slides:



Advertisements
Similar presentations
EE384y: Packet Switch Architectures
Advertisements

1 Scheduling Crossbar Switches Who do we chose to traverse the switch in the next time slot? N N 11.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Nick McKeown Spring 2012 Maximum Matching Algorithms EE384x Packet Switch Architectures.
Nick McKeown CS244 Lecture 6 Packet Switches. What you said The very premise of the paper was a bit of an eye- opener for me, for previously I had never.
Frame-Aggregated Concurrent Matching Switch Bill Lin (University of California, San Diego) Isaac Keslassy (Technion, Israel)
Towards Simple, High-performance Input-Queued Switch Schedulers Devavrat Shah Stanford University Berkeley, Dec 5 Joint work with Paolo Giaccone and Balaji.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Algorithm Orals Algorithm Qualifying Examination Orals Achieving 100% Throughput in IQ/CIOQ Switches using Maximum Size and Maximal Matching Algorithms.
Fast Matching Algorithms for Repetitive Optimization Sanjay Shakkottai, UT Austin Joint work with Supratim Deb (Bell Labs) and Devavrat Shah (MIT)
1 Input Queued Switches: Cell Switching vs. Packet Switching Abtin Keshavarzian Joint work with Yashar Ganjali, Devavrat Shah Stanford University.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion MSM.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion The.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion Scaling.
1 Internet Routers Stochastics Network Seminar February 22 nd 2002 Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
Maximum Size Matchings & Input Queued Switches Sundar Iyer, Nick McKeown High Performance Networking Group, Stanford University,
1 Achieving 100% throughput Where we are in the course… 1. Switch model 2. Uniform traffic  Technique: Uniform schedule (easy) 3. Non-uniform traffic,
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion Maximal.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion Scheduling.
Distributed Scheduling Algorithms for Switching Systems Shunyuan Ye, Yanming Shen, Shivendra Panwar
Load Balancing and Switch Scheduling Xiangheng Liu EE 384Y Final Presentation June 4, 2003.
1 Scheduling Crossbar Switches Who do we chose to traverse the switch in the next time slot? N N 11.
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
Load Balanced Birkhoff-von Neumann Switches
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty Traffic Michael J. Neely University of Southern California INFOCOM 2008, Phoenix,
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
High Speed Stable Packet Switches Shivendra S. Panwar Joint work with: Yihan Li, Yanming Shen and H. Jonathan Chao New York State Center for Advanced Technology.
Enabling Class of Service for CIOQ Switches with Maximal Weighted Algorithms Thursday, October 08, 2015 Feng Wang Siu Hong Yuen.
Summary of switching theory Balaji Prabhakar Stanford University.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Node-based Scheduling with Provable Evacuation Time Bo Ji Dept. of Computer & Information Sciences Temple University Joint work.
Abtin Keshavarzian Yashar Ganjali Department of Electrical Engineering Stanford University June 5, 2002 Cell Switching vs. Packet Switching EE384Y: Packet.
1 Performance Guarantees for Internet Routers ISL Affiliates Meeting April 4 th 2002 Nick McKeown Professor of Electrical Engineering and Computer Science,
Stress Resistant Scheduling Algorithms for CIOQ Switches Prashanth Pappu Applied Research Laboratory Washington University in St Louis “Stress Resistant.
1/24 Introduction to Graphs. 2/24 Graph Definition Graph : consists of vertices and edges. Each edge must start and end at a vertex. Graph G = (V, E)
Order Optimal Delay for Opportunistic Scheduling In Multi-User Wireless Uplinks and Downlinks Michael J. Neely University of Southern California
Buffered Crossbars With Performance Guarantees Shang-Tse (Da) Chuang Cisco Systems EE384Y Thursday, April 27, 2006.
SNRC Meeting June 7 th, Crossbar Switch Scheduling Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University
Stochastic Optimization for Markov Modulated Networks with Application to Delay Constrained Wireless Scheduling Michael J. Neely University of Southern.
Improving Matching algorithms for IQ switches Abhishek Das John J Kim.
Topics in Internet Research: Project Scope Mehreen Alam
Reduced Rate Switching in Optical Routers using Prediction Ritesh K. Madan, Yang Jiao EE384Y Course Project.
Using Traffic Models in Switch Scheduling Hammad M. Saleem Imran Q. Sayed June 3rd, 2002.
Input buffered switches (1)
1 Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
scheduling for local-area networks”
Independent Cascade Model and Linear Threshold Model
Scheduling Algorithms for Multi-Carrier Wireless Data Systems
Network Algorithms, Lecture 1: Intro and Principles
Introduction to Algorithms 6.046J/18.401J
Maximum Matching in the Online Batch-Arrival Model
R. Srikant University of Illinois at Urbana-Champaign
Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
Independent Cascade Model and Linear Threshold Model
Randomized Algorithms CS648
Utility Optimization with “Super-Fast”
Stability Analysis of MNCM Class of Algorithms and two more problems !
Balaji Prabhakar Departments of EE and CS Stanford University
Long Gong, Paul Tune, Liang Liu, Sen, Jun (Jim) Xu
Scheduling Crossbar Switches
Clustering.
Independent Cascade Model and Linear Threshold Model
EE384Y: Packet Switch Architectures II
Presentation transcript:

Balaji Prabhakar Departments of EE and CS Stanford University Randomized switch scheduling algorithms Balaji Prabhakar Departments of EE and CS Stanford University

Randomized algorithms Randomization is a method that can be used to simplify the implementation The main idea base decisions upon a small, randomly chosen sample of the state/input, instead of the complete state/input randomized algorithms are also robust to adversarial attacks (decisions depend on chance events)

An illustrative example Find the youngest person from a population of 1 billion Deterministic algorithm: linear search has a complexity of 1 billion A randomized version: find the youngest of 30 randomly chosen people has a complexity of 30 Performance linear search will find the absolute youngest person (rank = 1) if R is the person found by randomized algorithm, we can say thus, we can say that the performance of the randomized algorithm is good with a high probability

Randomizing iterative schemes Often, we want to perform some operation iteratively Example: find the youngest person each year Say in 2007 you choose 30 people at random and store the identity of the youngest person in memory in 2008 you choose 29 new people at random let R be the youngest person from these 29 + 1 = 30 people or

Randomized approximation to the Max Wt Matching algorithm joint work with Paolo Giaccone and Devavrat Shah

Notation and definitions Arrivals: Aij(t), i.i.d. Bernoulli, E(Aij(t)) = Q(t) = [Qij(t)] are backlogs at time t 1 2 3 Scheduling problem: Given Q(t), determine a matching, S(t), of inputs and outputs to maximize throughput and minimize backlogs Q(t+1) = [Q(t) + A(t) – S(t)]+

Useful performance metrics Throughput an algorithm is stable (or delivers 100% throughput) if for any admissible arrival, the average backlog is bounded; i.e. (equivalent to positive recurrence of Q(t)) Minimize average backlogs or, equivalently, packet delays

Scheduling: Bipartite graph matching 19 3 4 21 1 18 7 Schedule or Matching

Scheduling algorithms 19 3 4 21 1 18 7 Max Wt Matching 19 18 Max Size Matching 19 1 7 Practical Maximal Matchings  Stable (Tassiulas-Ephremides 92, McKeown et. al. 96, Dai-Prabhakar 00)  Not stable  Not stable (McKeown-Ananthram-Walrand 96)

The Maximum Weight Matching Algorithm MWM: performance throughput: stable (Tassiulas-Ephremides 92; McKeown et al 96; Dai-Prabhakar 00) backlogs: very low on average (Leonardi et al 01; Shah-Kopikare 02) MWM: implementation has cubic worst-case complexity (approx. 27,000 iterations for a 30-port switch) MWM algorithms involve backtracking: i.e. edges laid down in one iteration may be removed in a subsequent iteration algorithm not amenable to pipelining

Switch algorithms Better performance Easier implementation 19 19 18 1 Max Wt Matching 19 18 Maximal matching Max Size Matching 19 1 7 Not stable Not stable Stable and low backlogs Better performance Easier implementation

Randomized approximation to MWM Consider the following randomized approximation: At every time - sample d matchings independently and uniformly - use the heaviest of these d matchings to schedule packets Ideally we would like to use a small value of d. However,… Theorem. Even with d = N, this algorithm is not stable. In fact, when d = N, the throughput is at most (Giaccone-Prabhakar-Shah 02)

Proof Let Eij be the edge connecting input i to output j, then Since the edge Eij can be served only if it is chosen by at least one of the d matching, it follows that the throughput is at most 63%

Tassiulas’ algorithm Previous matching S(t-1) Random Matching R(t) Next time MAX Current matching S(t)

Tassiulas’ algorithm MAX S(t-1) R(t) W(R(t))=150 W(S(t-1))=160 S(t) 10 40 30 MAX 10 70 10 60 20 S(t-1) R(t) W(S(t-1))=160 W(R(t))=150 S(t)

Performance of Tassiulas’ algorithm Theorem (Tassiulas 98): The above scheme is stable under any admissible Bernoulli IID inputs.

Backlogs under Tassiulas’ algorithm

Reducing backlogs: the Merge operation 10 50 10 40 30 10 70 Merge 10 60 20 S(t-1) R(t) W(S(t-1))=160 W(R(t))=150 30 v/s 120 130 v/s 30

Reducing backlogs: the Merge operation 10 50 10 40 30 10 Merge 70 10 60 20 S(t-1) R(t) W(S(t-1))=160 W(R(t))=150 W(S(t)) = 250

Performance of Merge algorithm Theorem (GPS): The Merge scheme is stable under any admissible Bernoulli IID inputs.

Merge v/s Max

Use arrival information: Serena 23 7 47 89 3 11 31 2 97 5 S(t-1) The arrival graph W(S(t-1))=209

Use arrival information: Serena 23 47 89 3 11 31 2 97 5 S(t-1) The arrival graph W(S(t-1))=209

Use arrival information: Serena 23 23 47 89 3 11 31 Merge 97 6 S(t-1) W=121 W(S(t))=243 S(t) 89 3 23 31 97 W(S(t-1))=209

Performance of Serena algorithm Theorem (GPS): The Serena algorithm is stable under any admissible Bernoulli IID inputs.

Backlogs under Serena