Routing in Wireless and Adversarial Networks Christian Scheideler Institut für Informatik Technische Universität München.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Primal-Dual Algorithms for Connected Facility Location Chaitanya SwamyAmit Kumar Cornell University.
All-or-Nothing Multicommodity Flow Chandra Chekuri Sanjeev Khanna Bruce Shepherd Bell Labs U. Penn Bell Labs.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Yashar Ganjali Computer Systems Laboratory Stanford University February 13, 2003 Optimal Routing in the Internet.
Volcano Routing Scheme Routing in a Highly Dynamic Environment Yashar Ganjali Stanford University Joint work with: Nick McKeown SECON 2005, Santa Clara,
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Network Design Adam Meyerson Carnegie-Mellon University.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Online Algorithms for Network Design Adam Meyerson UCLA.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
CISS Princeton, March Optimization via Communication Networks Matthew Andrews Alcatel-Lucent Bell Labs.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Yashar Ganjali High Performance Networking Group Stanford University September 17, 2003 Minimum-delay Routing.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
A DoS-Resilient Information System for Dynamic Data Management Stefan Schmid & Christian Scheideler Dept. of Computer Science University of Paderborn Matthias.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Approximation Algorithms for Stochastic Combinatorial Optimization Part I: Multistage problems Anupam Gupta Carnegie Mellon University.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
Online Packet Admission and Oblivious Routing in Sensor Networks Mohamed Aly Department of Computer Science University of Pittsburgh And John Augustine.
June 10, 2003STOC 2003 Optimal Oblivious Routing in Polynomial Time Harald Räcke Paderborn Edith Cohen AT&T Labs-Research Yossi Azar Amos Fiat Haim Kaplan.
Oblivious Routing: Tuba Yilmaz & Rajiv Iyer (Prof. Dana Randall - CS 6550) 1.
Throughput Competitive Online Routing Baruch Awerbuch Yossi Azar Serge Plotkin.
Models and Techniques for Communication in Dynamic Networks Christian Scheideler Dept. of Computer Science Johns Hopkins University.
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
Towards Scalable and Robust Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München Baruch Awerbuch Dept. of Computer.
Distributed Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopDistributed Algorithms1.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Optimal Oblivious Routing in Hole-Free Networks Costas Busch Louisiana State University Malik Magdon-Ismail Rensselaer Polytechnic Institute.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Another story on Multi-commodity Flows and its “dual” Network Monitoring Rohit Khandekar IBM Watson Joint work with Baruch Awerbuch JHU TexPoint fonts.
Towards a More Fair and Robust Internet Backbone Year 1 Status Report Rene Cruz, Tara Javidi, Bill Lin Center for Networked Systems University of California,
1 Stateless Optimization of Multi-Commodity Flow Baruch Awerbuch JHU Rohit Khandekar IBM Watson TexPoint fonts used in EMF. Read the TexPoint manual before.
1 Costas Busch Õ(Congestion + Dilation) Hot-Potato Routing on Leveled Networks Costas Busch Rensselaer Polytechnic Institute.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
William Stallings Data and Computer Communications 7th Edition
New algorithms for Disjoint Paths and Routing Problems
Graph Partitioning using Single Commodity Flows
Towards a Scalable and Robust DHT Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
New Algorithms for Disjoint Paths Problems Sanjeev Khanna University of Pennsylvania Joint work with Chandra Chekuri Bruce Shepherd.
William Stallings Data and Computer Communications
Impact of Interference on Multi-hop Wireless Network Performance
Constraint-Based Routing
Network Layer – Routing 1
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Optimal Control for Generalized Network-Flow Problems
Presentation transcript:

Routing in Wireless and Adversarial Networks Christian Scheideler Institut für Informatik Technische Universität München

Routing Path selection Scheduling Admission control A B

Classical Routing Theory Given a path collection with congestion C (max. number of paths over edge) and dilation D (max. length of a path) find (near-)optimal schedule for packets.

Classical Routing Theory Leighton, Maggs, Rao 88: There is a schedule with O(C+D) runtime. Also for non-uniform edges [Feige & S 98] Since then many randomized online protocols with runtime ~O(C+D) w.h.p. Basic techniques: random delays or ranks

Classical Routing Theory Extensions faulty and wireless networks. Adler & S 98: G=(V,E) with probabilities p:E ! [0,1] H=(V,E) with latencies l(e)=1/p(e) Valid routing schedule of length T for H can be simulated in G in time O(T log L + L log n), w.h.p.; L: max. latency

Scheduling Classical model: batch-like scheduling More relevant models: Stochastic injection models (packets are continuously injected using Poisson distribution or Markov chains) Adversarial queueing theory (introduced by Borodin et al. 96)

Adversarial Queueing Theory Basic model: Static network G=(V,E) (w, )-bounded adversary continuously injects packets subject to the condition that for all edges e and all time intervals of length w, it injects at most w packets with paths containing e All packets have to be delivered ( <=1)

Adversarial Queueing Theory Basic results: Universal stability and instability of various queueing disciplines (FIFO, SIS, LIS, NTO,…) Universal stability of networks

Adversarial Queueing Theory Networks with time-varying channels: Packet injections and edges under adversarial control Andrews and Zhang 04: Variant of NTO is universally stable in this model

Adversarial Routing Theory Paths are not given to system: Aiello, Kushilevitz, Ostrovsky, Rosen ’98: local load balancing techniques can be used to keep queues bounded

Adversarial Routing Theory Paths are not given to system: Awerbuch, Brinkmann & S ’03: local load balancing technique with bounded queues also handles admission, works even for adversarial networks

Adversarial Routing Theory Paths are not given to system: Awerbuch, Brinkmann & S ’03: load balancing technique with O(L/  ) times buffer space of OPT is (1+  )-competitive w.r.t. throughput; L: max path length

Path Selection Problems: - packet-based paths: slow delivery - destination-based paths: congestion Better: source-based path selection (MPLS: Multiprotocol Label Switching)

Path Selection Classical work: path selection strategies for specific networks (n£n-mesh) A B x-y routing

Path Selection x-y routing: ~worst-case optimal congestion and dilation for permutation routing A B x-y routing

Path Selection x-y routing: far from optimal in general s2s2 t1t1 x-y routing t2t2 s1s1 s3s3 t3t3

Path Selection Trick: use hierarchical randomized routing.  log n)-competitive for any problem s2s2 t1t1 t2t2 s1s1 s3s3 t3t3

Oblivious Path Selection Räcke 02: For any network with edge capacities, path collections for random path selection can be set up for every source-destination pair s.t. the expected congestion of routing any routing problem is O(log 3 n)- competitive. Best bound [HHR03]: ~O(log 2 n) 1/2 1/4

Oblivious Path Selection Also works well for certain dynamic net- works for peer-to-peer systems. Trick: continuous-discrete approach route in virtual space nodes partition virtual space among them

Oblivious Path Selection Does not work well for wireless, unknown or adversarial networks (e.g., unstructured P2P systems with adversarial presence)

Adaptive Path Selection Basic Idea: Garg & Könemann 98 Multicommodity flow problem: collection of commodities (source, dest., demand) Solution 1: use LP Solution 2: combinatorial approach (path packing using primal-dual approach)

Garg-Könemann Framework Problem: MCF (maximum concurrent flow problem), i.e., given commodities with demands d i, find flows of value d i for commodities s.t. max e f e /c e minimized Goal: find (1+  )-approximate solution via path packing

Garg-Könemann Framework Initially, f e i =0 for all commodities i and edges e Algorithm runs in T=ln m/  2 phases, routes a flow of d i /T for each commodity i in each phase A phase consists of several steps In each step, flows augmented simultaneously subject to two constraints: (1+  )-shortest paths constraint, using edge lengths l e = m cong e /  /c e with cong e = f e /c e step-size constraint:  l e <=  l e (which implies  f e <=  2 c e /ln m)

Garg-Könemann Framework Original Garg-Könemann approach: Route commodities in round-robin fashion, one commodity per step ) #steps depends linearly on #commidities Awerbuch, Khandekar and Rao 07: Route commodities simultaneously in each step using capacities c e i =  2 f e i /log m for comm i ) multiplicative-increase strategy, faster conv

Garg-Könemann Framework Awerbuch, Khandekar and Rao 07: runtime O(L log 3 m log k) L: max flow length, k: #commodities L small (hypercube): fast convergence L always boundable by expansion of net (flow shortening lemma [Kolman & S 02])

Oblivious vs. Adaptive Congestion for arbitrary routing problems in hypercubic networks: Oblivious path selection:  (log n)-competitive, paths instantly, update of path system complicated Adaptive path selection: (1+  )-competitive, paths in polylog comm rounds, continuous updates easy

Adaptive Path Selection Problem: previous approaches not stateless resp. self-stabilizing Awerbuch and Khandekar 07: Adaptive path selection strategy that only needs to know current state Fast convergence through greedy strategy based on multiplicative increase, additive decrease

Adversarial Path Selection Scenario I: Adversaries part of network, but path along honest nodes available A B

Adversarial Path Selection Basic approach: A fixes a path from A to B. Path does not work: A identifies bad edge. A B

Adversarial Path Selection Identification of bad edge: Acknowledgements via binary search A B

Adversarial Path Selection Maximum number of attempts: m (# edges) Either successful or edge killed. A B

Adversarial Path Selection Improvement: use recommendations If neighbor knows better, suggests a diff path ! collaborative learning A B

Adversarial Path Selection Scenario II: All nodes adversarial. Awerbuch and Kleinberg 04: Learns best static path in hindsight A B

Adversarial path selection Model: There is a set S of static strategies (paths) Algorithm A interacts with adversary for T steps In each step j, the adversary picks a cost function c j :S ! IR and A picks a random strategy x j 2 S Only cost of chosen strategy revealed to A The regret of the algorithm A is defined as R(A) = E[  j c j (x j ) – min x 2 S  j c j (x)]

Adversarial Path Selection Awerbuch and Kleinberg: Regret of O(T 2/3 C m 5/3 ) against oblivious adversary C: maximum cost difference, m: #edges Regret of O(T 2/3 C 7/3 m 1/3 ) against adaptive adversary Regret does not depend on |S| !

Adversarial Path Selection Otto von Bismarck: Fools learn from experience; wise men learn from the experience of others. Only collaborative learning result due to Awerbuch and Hayes 07, who study the dynamic regret for |S|=2: R(A) = avg a E[  j c j (x j ) –  j min x 2 S c j (x)]

Adversarial Path Selection Awerbuch and Hayes 07: N agents, n of which are honest In each round, agents make decisions in a fixed order, report the costs incurred Costs are either 0 or 1 Dynamic regret: O(log N 2 + T/n) log 2 N: rounds to figure out whom to trust T/n: just one mistake per round

Adversarial Path Selection Scenario III: Network topology unknown but position of destination known Geometric spanners (wireless networks) Navigable graphs (small world) pioneered by Kleinberg 96 How to design self-stabilizing processes?

Adversarial Path Selection Scenario IV: Network topology unknown and position of destination unknown ! discovery via flooding A B

Open Problems Scheduling: non-uniform problems Path selection: many open problems left Collaborative learning approaches particularly interesting

Questions?