Algorithms for Budget-Constrained Survivable Topology Design

Slides:



Advertisements
Similar presentations
NP-Hard Nattee Niparnan.
Advertisements

~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Novembro 2003 Tabu search heuristic for partition coloring1/29 XXXV SBPO XXXV SBPO Natal, 4-7 de novembro de 2003 A Tabu Search Heuristic for Partition.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
1 NP-completeness Lecture 2: Jan P The class of problems that can be solved in polynomial time. e.g. gcd, shortest path, prime, etc. There are many.
Five Problems CSE 421 Richard Anderson Winter 2009, Lecture 3.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
The Theory of NP-Completeness
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Backtracking Reading Material: Chapter 13, Sections 1, 2, 4, and 5.
Two Discrete Optimization Problems Problem #2: The Minimum Cost Spanning Tree Problem.
Steiner trees Algorithms and Networks. Steiner Trees2 Today Steiner trees: what and why? NP-completeness Approximation algorithms Preprocessing.
Elements of the Heuristic Approach
Escaping local optimas Accept nonimproving neighbors – Tabu search and simulated annealing Iterating with different initial solutions – Multistart local.
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
Efficient Gathering of Correlated Data in Sensor Networks
Design Techniques for Approximation Algorithms and Approximation Classes.
Approximation Algorithms
Techniques for Proving NP-Completeness Show that a special case of the problem you are interested in is NP- complete. For example: The problem of finding.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Survivable Paths in Multilayer Networks Marzieh Parandehgheibi Hyang-won Lee Eytan Modiano 46 th Annual Conference on Information Sciences and Systems.
Algorithms for hard problems Introduction Juris Viksna, 2015.
ICS 353: Design and Analysis of Algorithms Backtracking King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Introduction to NP Instructor: Neelima Gupta 1.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
1 Ch18. The Greedy Methods. 2 BIRD’S-EYE VIEW Enter the world of algorithm-design methods In the remainder of this book, we study the methods for the.
On the Ability of Graph Coloring Heuristics to Find Substructures in Social Networks David Chalupa By, Tejaswini Nallagatla.
ICS 353: Design and Analysis of Algorithms NP-Complete Problems King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Prof. Yu-Chee Tseng Department of Computer Science
The Theory of NP-Completeness
NP-Completeness (2) NP-Completeness Graphs 4/13/2018 5:22 AM x x x x x
More NP-Complete and NP-hard Problems
Chapter 10 NP-Complete Problems.
Richard Anderson Lecture 26 NP-Completeness
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
Richard Anderson Lecture 26 NP-Completeness
Design and Analysis of Algorithm
Graph Theory and Algorithm 02
ME 521 Computer Aided Design 15-Optimization
Subject Name: Operation Research Subject Code: 10CS661 Prepared By:Mrs
Computability and Complexity
Peer-to-Peer and Social Networks
1.3 Modeling with exponentially many constr.
Graph Algorithm.
ICS 353: Design and Analysis of Algorithms
NP-Completeness (2) NP-Completeness Graphs 11/23/2018 2:12 PM x x x x
Exam 2 LZW not on syllabus. 73% / 75%.
NP-Complete Problems.
1.3 Modeling with exponentially many constr.
A Fundamental Bi-partition Algorithm of Kernighan-Lin
Branch and Bound Searching Strategies
Algorithm Design Methods
Chapter 6 Network Flow Models.
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979.
The Theory of NP-Completeness
CSE 550 Computer Network Design
CSE 421, University of Washington, Autumn 2006
The Greedy Approach Young CS 530 Adv. Algo. Greedy.
ICS 353: Design and Analysis of Algorithms
Major Design Strategies
More NP-Complete Problems
Lecture 2 Geometric Algorithms.
Approximation Algorithms
Algorithm Course Dr. Aref Rashad
NP-Completeness (2) NP-Completeness Graphs 7/9/2019 6:12 AM x x x x x
Major Design Strategies
Presentation transcript:

Algorithms for Budget-Constrained Survivable Topology Design Nikhil Garg, Rahul Simha and Wenxun Xing Presented by Lillian Tseng

Outline Introduction Formulation of 2-PMOP Greedy Algorithms Path-based Greedy Algorithm Largest-Overlap-Reduction Greedy Algorithm Local Search Simulated Annealing Conclusion 2019/1/18 ICC 2002

Introduction Complete augmentation where the goal is to ensure two edge-disjoint (or node-disjoint) paths for every pairs of nodes. Practical networking constraints: It’s impossible to build a link between every pair of nodes. The costs of each potential edges may vary drastically. The requirement that complete edge-disjoint paths be found may decrease the acceptable solution space sharply. Penalty to overlapped paths. Only a subset of S-D pairs may be included. Optimization with a limited budget. 2. Cost to lay a new optical fiber or lease a new line 4. Different connections has different protection requirements 2019/1/18 ICC 2002

Introduction Characteristics of the topology augmentation problem: Both costs and topology structure play important roles in determining an effective solution  knapsack-like problem. Finding the paths between S-D pairs  Hamiltonian-path problem. So it’s hard to perform single-parameter greedy heuristic. 2019/1/18 ICC 2002

Formulation of 2-PMOP G=(V, E), a connected, undirected network graph, V is the vertex set and E is the set of links, for each of which has distance d(i,j). Collection of source-destination required pairs Set of potential edges For each associate a positive cost of building an edge c(i,j). 2019/1/18 ICC 2002

Formulation of 2-PMOP Define the overlap distance of Ps,d and P’s,d (two paths from s to d in G): Here we need 2 paths for each , so let to be the total network overlap distance. 2-PMOP: for a given budget B, find 2019/1/18 ICC 2002

Formulation of 2-PMOP Decision Variables: 2019/1/18 ICC 2002

t 2 4 6 s 1 3 5 2-PMOP is NP-hard Show 2-PMOP is NP-hard by reducing the Partition problem: Given any instance of PARTITION, a connected communication graph G=(V,E) can be constructed, where V={s,t,1,2,…,2n+2} and E={(s,1),(s,2),(1,2),(1,3),(3,4),(3,5),…,(2n+1,2n+2),(2n+1,t),(2n+2,t)}. 2019/1/18 ICC 2002

2-PMOP is NP-hard The distance of each edge is defined as The cost of the potential edge is defined as t 2 c1 4 c2 6 s 1 c1 3 c2 5 2019/1/18 ICC 2002

2-PMOP is NP-hard Budget: . Transformation: Given a connected communication graph G=(V,E), distances , costs is there a solution of 2-PMOP such that and the total cost of the added edges is with the given budget? 2019/1/18 ICC 2002

2-PMOP is NP-hard The common shared edges of 2-PMOP are (2i-1,2(i+1)-1),i=1,2,…,n. When removing one edge (2i-1,2(i+1)-1) of distance ci out of the shared edge list, an edge (2i,2(i+1)) with cost ci must be added. Derive the relationship between the solutions of PARTITION and 2-PMOP: The objective value satisfies If i is select to an element of S, then edge (2i,2i+2) is add to the graph t 2 c1 4 c2 6 s 1 c1 3 c2 5 2019/1/18 ICC 2002

Relaxed Problem of 2-PMOP Given a selected set of edges. Budget constraint is relaxed by a given set T 2019/1/18 ICC 2002

Some Propositions k pairs O(n2) at most (n-1) edges total O(kn3) 2019/1/18 ICC 2002

Restate the Problem The set T is constructed and varied in each heuristic: Greedy Algorithms Path-based Greedy Algorithm Largest-Overlap-Reduction Greedy Algorithm Local Search Simulated Annealing 2019/1/18 ICC 2002

Greedy Algorithm Input: 2019/1/18 ICC 2002

Greedy Algorithm Time Complexity: For each iteration |F|*O(kn3) At most |F| edges can be added |F|2*O(kn3)=O(|F|2kn3) Greedy Algorithm adds one edge at a time The order of edges is determined, knapsack-like, by the per-unit-cost effectiveness in reducing the objective function 2019/1/18 ICC 2002

Greedy Algorithm 2019/1/18 ICC 2002

Path-based Greedy Algorithm Sometimes, the overlap on a certain pat is best reduced by a secondary path. Each new path may impact different S-D pairs in various ways. Use the “profit” function f for a path pi, containing both length of the critical edge and partial length of the critical edges, whose secondary paths share edges with pi. The frequency of an edge being used decides the edge’s importance. New path only reduce overlap for some S-D pairs 2019/1/18 ICC 2002

Path-based Greedy Algorithm 2019/1/18 ICC 2002

Path-based Greedy Algorithm 2019/1/18 ICC 2002

Largest-Overlap-Reduction Greedy Algorithm Stitch together some of alternate paths for articulated edges in to more compact paths by weighting commonly occurring edges more heavily. The path-based heuristic can only select edges from secondary paths, i.e. shortest paths. A profitability function for edges rather than paths. Retain the “path” part by assigning profitability based on overlap reduction for individual paths. If the primary path contains several articulated edges, which means they’re also contained in the alternate paths, it’s difficult to select edges in the alternate paths for these critical edges. We assign the reduction profit for a path rather than total overlap 2019/1/18 ICC 2002

Largest-Overlap-Reduction Greedy Algorithm A B d s 10 The profit function g will assign the same high “profit” to all the edges in the secondary path for the largest overlap reduction, thus retaining the path-based approach, but with an edge based greedy solution. 2019/1/18 ICC 2002

Local Search Number of the neighbors of Y is 1+|F|+|F|(|F|-1)/2. i.e. (no change) + (one edge of different status with Y) + (two edges of different status with Y). We can also solve 2-PMOP by providing a configuration of potential edges: Thus, we can obtain a set T of added edges by , denoted it as T(y). Compute Z2(T(y)) by solving the relaxation problem in O(kn3). Define the neighborhood of Y as 2019/1/18 ICC 2002

Local Search 2019/1/18 ICC 2002

Simulated Annealing It can provide good solutions for many NP-hard problems. Essential components: Initial solution. A method for selecting a random neighbor in solution space. A cooling schedule. A stopping criterion. 2019/1/18 ICC 2002

Computational Results Overlaps remained after adding potential edges from F In all cases, one of the three Greedy Algorithms gets the result as good as annealing Local search got the best result?? Path-based is the worst?? No “time graph” attached Although “Local Search” perform better results than “Greedy Algorithms”, “Greedy Algorithms” outperform “Local Search” in terms of execution time. 2019/1/18 ICC 2002

Computational Results For smaller graphs, it’s useful to use some exhaustive strategy like simulation annealing to obtain solutions for the given problem. The problem depends heavily on the costs of potential edges. For unit-cost edges cases, the solution obtained by all heuristic were identical. 2019/1/18 ICC 2002

Conclusions Class of augmentation problems that form an important area in survivable network design is concerned. The formulation, inspired by some practical considerations, was shown to be NP-hard. The paper presented three polynomial-time heuristics to solve the 2-PMOP problem. At least one of the heuristics presented can provide a near-optimal solution. 2019/1/18 ICC 2002

The End

Summary Survivability: Link connectivity. Objective: Finding the fewest links to add to a topology to make the topology 2-edge-connected(or minimizing the overlaps) under some constraints. Analysis method: Quantitative methods. Non-linear programming Solved by Greedy algorithms, Local Search and Simulated Annealing. 2019/1/18 ICC 2002