Virtual Network Mapping: A Graph Pattern Matching Approach Yang Cao 1,2, Wenfei Fan 1,2, Shuai Ma 2 1 1 University of Edinburgh 2 Beihang University.

Slides:



Advertisements
Similar presentations
Analysis of Computer Algorithms
Advertisements

VM Interference and Placement for Server Consolidation Umesh Bellur IIT Bombay.
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, and Chonggang Wang University of Minnesota, AT&T Lab, Arizona State University, Syracuse University, NEC.
Yinghui Wu, LFCS DB talk Database Group Meeting Talk Yinghui Wu 10/11/ Simulation Revised for Graph Pattern Matching.
Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tianyu Wo Capturing Topology in Graph Pattern Matching University of Edinburgh.
New Models for Graph Pattern Matching Shuai Ma ( 马 帅 )
The Who, What, Why and How of High Performance Computing Applications in the Cloud Soheila Abrishami 1.
Towards Virtual Routers as a Service 6th GI/ITG KuVS Workshop on “Future Internet” November 22, 2010 Hannover Zdravko Bozakov.
Towards Feasibility Region Calculus: An End-to-end Schedulability Analysis of Real- Time Multistage Execution William Hawkins and Tarek Abdelzaher Presented.
A Comparison of Layering and Stream Replication Video Multicast Schemes Taehyun Kim and Mostafa H. Ammar.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Interference Minimization and Uplink Relaying For a 3G/WLAN Network Ju Wang Virginia Commonwealth University May, 2005.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yinghui Wu LFCS Lab Lunch Homomorphism and Simulation Revised for Graph Matching.
Making Pattern Queries Bounded in Big Graphs 11 Yang Cao 1,2 Wenfei Fan 1,2 Jinpeng Huai 2 Ruizhe Huang 1 1 University of Edinburgh 2 Beihang University.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Network Aware Resource Allocation in Distributed Clouds.
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
ANTs PI Meeting, Nov. 29, 2000W. Zhang, Washington University1 Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions.
Diversified Top-k Graph Pattern Matching 1 Yinghui Wu UC Santa Barbara Wenfei Fan University of Edinburgh Southwest Jiaotong University Xin Wang.
What is Computer Science About? Part 2: Algorithms.
Improved Approximation Algorithms for the Quality of Service Steiner Tree Problem M. Karpinski Bonn University I. Măndoiu UC San Diego A. Olshevsky GaTech.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
The minimum cost flow problem. Simplifying assumptions Network is connected (as an undirected graph). – We can consider each connected component separately.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
IBM T. J. Watson Research © 2004 IBM Corporation On Scalable Storage Area Network(SAN) Fabric Design Algorithm Bong-Jun Ko (Columbia University) Kang-Won.
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
Automated Bandwidth Allocation Problems in Data Centers Yifei Yuan, Anduo Wang, Rajeev Alur, Boon Thau Loo University of Pennsylvania.
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
Embedded System Lab 김해천 Thread and Memory Placement on NUMA Systems: Asymmetry Matters.
Yinghui Wu, ICDE Adding Regular Expressions to Graph Reachability and Pattern Queries Wenfei Fan Shuai Ma Nan Tang Yinghui Wu University of Edinburgh.
Learning the Structure of Related Tasks Presented by Lihan He Machine Learning Reading Group Duke University 02/03/2006 A. Niculescu-Mizil, R. Caruana.
Answering pattern queries using views Yinghui Wu UC Santa Barbara Wenfei Fan University of EdinburghSouthwest Jiaotong University Xin Wang.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
COSC 5341 High-Performance Computer Networks Presentation for By Linghai Zhang ID:
Multi-Source Latency Variation Synchronization for Collaborative Applications Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Resource Allocation in Network Virtualization Jie Wu Computer and Information Sciences Temple University.
Static Process Scheduling
Network-Aware Query Processing for Stream- based Application Yanif Ahmad, Ugur Cetintemel - Brown University VLDB 2004.
Virtual-Channel Flow Control William J. Dally
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Optimizing server placement in distributed systems in the presence of competition Jan-Jan Wu( 吳真貞 ), Shu-Fan Shih ( 施書帆 ), Pangfeng Liu ( 劉邦鋒 ), Yi-Min.
Yinghui Wu, SIGMOD Incremental Graph Pattern Matching Wenfei Fan Xin Wang Yinghui Wu University of Edinburgh Jianzhong Li Jizhou Luo Harbin Institute.
Maximum Flow Problem Definitions and notations The Ford-Fulkerson method.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Impact of Interference on Multi-hop Wireless Network Performance
Constraint-Based Routing
Qian Hu, Yang Wang, Xiaojun Cao Department of Computer Science
Hydra: Leveraging Functional Slicing for Efficient Distributed SDN Controllers Yiyang Chang, Ashkan Rezaei, Balajee Vamanan, Jahangir Hasan, Sanjay Rao.
Routing and Switching Fabrics
What is VN Embedding? Given: Task :
A Study of Group-Tree Matching in Large Scale Group Communications
Globa Larysa prof, Dr.; Skulysh Mariia, PhD; Sulima Svitlana
Server Allocation for Multiplayer Cloud Gaming
Lottery Scheduling Ish Baid.
CS223 Advanced Data Structures and Algorithms
Robustness of wireless ad hoc network topologies
Simulation based approach Shang Zechao
Robustness of wireless ad hoc network topologies
Taehyun Kim and Mostafa H. Ammar
What is Computer Science About? Part 2: Algorithms
Maximum Flow Neil Tang 4/8/2008
Routing and Switching Fabrics
Towards Predictable Datacenter Networks
Presentation transcript:

Virtual Network Mapping: A Graph Pattern Matching Approach Yang Cao 1,2, Wenfei Fan 1,2, Shuai Ma University of Edinburgh 2 Beihang University

Virtual Network Mapping (VNM) Input:  A substrate network (SN): a network of physical machines Substract nodes with CPU or storage capacities Physical edges with bandwidth or latency  A virtual network (VN) Virtual nodes (VMs, machines or routers) with requirements on CPU or storage Virtual links (i.e., edges) with requirements on bandwidth or latency Output:  Virtual network mapping: a deployment of VN in the SN Hosting on substrate nodes on virtual nodes Instantiating virtual links on physical paths Constraints on the virtual nodes and links are satisfied f: v ∈ VN → v’ ∈ SN g: link (u, v) ∈ VN  path (f(u), f(v)) ∈ SN 2 VNM helps to deploy virtual network requests in a data center network (Amazon EC2 & distributed DBs) in response to real-time requests!

Existing Models on VNM in Different Settings Virtual machine placement (VMP)  node mapping g: v ∈ VN → v’ ∈ SN  the capacity of v is no greater than that of v’ Single-path VN embedding (VNE SP )  node mapping g: v ∈ VN → v’ ∈ SN  edging mapping h: link (u, v) ∈ VN  path (g(u), g(v)) ∈ SN  constraints on nodes and edges are satisfied Multi-path VN embedding (VNE MP )  g: v ∈ VN → v’ ∈ SN  h: link (u,v) → a set of paths from g(u) to g(v)  constraints on nodes and edges are satisfied only nodes are considered nodes and links are both considered one virtual link can be mapped to multiple paths However, many VN requests commonly found in practice could NOT be expressed in any of theses models! 3

Example 1: Mapping with Latency Constraints (VNM L ) Requirements on CPUs and latencies latency sensitive applications: multimedia transmitting networks  g: v ∈ VN → v’ ∈ SN satisfying constraints on CPU  h: link (u, v) ∈ VN  path (g(u), g(v)) ∈ SN the sum of the latencies of edges on the path (g(u), g(v)) does not exceed the latency specified by (u, v) 4

Example 2: Priority Mapping (VNM P ) Requirements on CPUs and bandwidths  g: v ∈ VN → v’ ∈ SN satisfying constraints on CPU  h: link (u, v) ∈ VN  path (g(u), g(v)) ∈ SN the minimum bandwidth of all edges on the path (g(u), g(v)) is no less than the bandwidth specified for (u,v)  we want to give different priorities at run time to virtual links that share some physical links, and require the mapping only to provide bandwidth guarantee for the connection with the highest priority 5

Example 3: Mapping with Node Sharing (VNM SP(NS) ) Requirements on CPUs, bandwidths and node sharing An extension of the single-path VN embedding (VNM SP )  g: v ∈ VN → v’ ∈ SN  h: link (u, v) ∈ VN  path (g(u), g(v)) ∈ SN  constraints on nodes and edges are satisfied  allowing mapping multiple virtual nodes to the same substrate nodes, i.e., node sharing from the practical need from X-Bone VNM varies from practical requirements (latency, high-priority connections, node sharing) Existing models are not capable of expressing such requirements (e.g., VNM L, VNM P, VNE SP(NS) ) It would be an overkill to develop a model for each case and study it individually A unified model is needed to express and analyze VNMs in various practical settings! 6

Outline A unified model to characterize VNMs in terms of graph pattern matching Complexity and approximation bounds for VNMs Conclusion and Future work 7

Graph Pattern Matching Model for VNM Substrate network (SN)  Weighted directed graphs G S = (V S, E S, f Vs, f Es ) Vs: set of substrate nodes Es: set of physical edges f Vs : resource capacities on nodes f Es : resource capacities on edges Virtual network matching (VNM)  A node mapping (g, r V ) from G P to G S Function g: V P → V S, g(v)=v’ Function r V : V P ×V S → N r V (v,v’): the amount of resource of the v’ that is allocated to v  An edge mapping (h, r E ) from Gp to Gs Function h: E P → 2 Es, h((u,v)) is a subset of paths from g(u) to g(v) Function r E : (E P, 2 Es ) → N, r E (e,p) is the amount of resource of the physical path p allocated to the virtual link e Virtual network (VN)  Weighted directed graphs G P = (V P, E P, f Vp, f Ep ) Vs: set of vitual nodes Es: set of vitual links f Vs : resource requirements on nodes f Es : resource requirements on links 8

Graph Pattern Matching Model for VNM (cont.) A VN request to an SN G S : (G P, C )  G P : VN  C : a set of of global constraints on VNM Each constraint in C is one of the following  Node constraints when a virtual node v is hosted by v’, then v’ must provide adequate resource: f Vp (v) ≤r(v,v’) when a subtracted node v’ host (possibly multiple) virtual nodes, v’ must have sufficient capacity to accommodate all those virtual nodes: f Vp (v’)≥ sum{Rv(v, v’)| v’ ∈ g(v)}  Edge constraints when a virutal link e is mapped to a set of paths, those physical paths together satisfy the requirements of e: f Ep (e) op agg{Re(e, p)| p ∈ h(e)}, op ∈ {≥, ≤}, agg ∈ {min,max,sum} Each physical link has sufficient bandwidth to host all virtual links that are mapped to some physical path containing e’ the bandwidth of each path p allocated to a virtual link e can not exceed the minimum bandwidth of the physical links on p. Find more formal discussions in the paper All VN requests mentioned before can be formally expressed with the model 9

A VN request (G P, C) can be mapped to an SN G S if  there exists node mapping (g, r V ) and edge mapping (h, r E )  all the constraints of C are satisfied Graph Pattern Matching Model for VNM (cont.) The VNM problem  Input: an VN request (G P, C), an SN G S  Question: whether (G P, C) can be mapped to G S ? 10

The Computational Complexity of VNM The VNM problem is  in NP regardless of what constraints are present  in PTIME when only node constraints are present, without node sharing  it becomes NP-complete when node sharing is requested  it is NP-complete in the presence of edge constraints upper bound virtual machine placement (VMP) All the results hold even when both VNs and SNs are DAGs Priority mapping (VNM P ) mapping with latency constraints (VNM L ) single-path VN embedding (VNE SP ) multi-path VN embedding (VNE MP ) all mapping extended with node sharing 11

The Optimization Problem of VNM Find a VNM mapping with “the lowest cost”  each node and edge in SN is associated with a price of the resources  the cost of a VNM mapping ((g, r V ), (h, r E )) from (G P, C) to G S informally, the “sum” of all prices of nodes and edges involved in the mapping the more CPU (bandwidth) resource is allocated, the higher the cost it incurs when latency is considered, the cost of the edge mapping is determined only by edge mapping h, whereas the resource allocation function is irrelevant. the cost function is motivated by economic models of network virtualization 12

The minimum cost mapping problem  Input: an VN request (G P, C), an SN G S, a cost function c  Output: a mapping ((g, r V ), (h, r E )) from (G P, C) to G S with minimum cost The Optimization Problem of VNM The VNM problem is  in PTIME for VMP without node sharing; however, when node sharing is quested, it becomes APX-hard  NPO-complete for VNM for VNM P, VNE SP, VNE MP, VNM L, VNMP (NS), VNE SP(NS), VNM L(NS)  APX-hard when there is a unique node mapping in the presence of edge constraints. In particular, VNM P does not admit ln(|V P |)-approximation, unless P=NP The NPO-hardness results remain intact even when both VNs and SNs are DAGs 13

Summary of Complexity Results of VNM 14

Conclusion and Future Work Summary  A uniform model for VNM based on graph pattern matching Richer graph pattern matching semantics can be found in areas other than pure DB DB ideas can help other areas to develop deeper understanding (and design algorithms)  Complexity and approximability analysis Show why there are limited related works on efficient algorithms for VMP Future work  Algorithms for new VN requests under the model Partly done  Find more interesting semantics for graph pattern matching 15