Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Optical Networks BM-UC Davis122 Part III Wide-Area (Wavelength-Routed) Optical Networks – 1.Virtual Topology Design 2.Wavelength Conversion 3.Control and.
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
CS774. Markov Random Field : Theory and Application Lecture 17 Kyomin Jung KAIST Nov
The Cache Location Problem. Overview TERCs Vs. Proxies Stability Cache location.
Infinite Horizon Problems
Discrete geometry Lecture 2 1 © Alexander & Michael Bronstein
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Clustering Color/Intensity
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Analysis of Algorithms CS 477/677
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
2-Layer Crossing Minimisation Johan van Rooij. Overview Problem definitions NP-Hardness proof Heuristics & Performance Practical Computation One layer:
Path Protection in MPLS Networks Using Segment Based Approach.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
CS541 Advanced Networking 1 Static Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/9/2009.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
Lecture 09 Clustering-based Learning
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Radial Basis Function Networks
Ant Colony Optimization: an introduction
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Algorithms for Network Optimization Problems This handout: Minimum Spanning Tree Problem Approximation Algorithms Traveling Salesman Problem.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Network Aware Resource Allocation in Distributed Clouds.
1 Local search and optimization Local search= use single current state and move to neighboring states. Advantages: –Use very little memory –Find often.
L14. Fair networks and topology design D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
11 Experimental and Analytical Evaluation of Available Bandwidth Estimation Tools Cesar D. Guerrero and Miguel A. Labrador Department of Computer Science.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
1 Short Term Scheduling. 2  Planning horizon is short  Multiple unique jobs (tasks) with varying processing times and due dates  Multiple unique jobs.
Exact and heuristics algorithms
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
1 Algorithmic aspects of radio access network design in 4G cellular networks David Amzallag Computer Science Department, Technion Joint work with Seffi.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Data Mining: Cluster Analysis This lecture node is modified based on Lecture Notes for Chapter.
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Given a set of data points as input Randomly assign each point to one of the k clusters Repeat until convergence – Calculate model of each of the k clusters.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Draft-deoliveira-diff-te-preemption-02.txt J. C. de Oliveira, JP Vasseur, L. Chen, C. Scoglio Updates: –Co-author: JP Vasseur –New preemption criterion.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Clustering (2) Center-based algorithms Fuzzy k-means Density-based algorithms ( DBSCAN as an example ) Evaluation of clustering results Figures and equations.
Traffic Engineering with AIMD in MPLS Networks
ISP and Egress Path Selection for Multihomed Networks
Algorithms for Budget-Constrained Survivable Topology Design
Chapter 6 Network Flow Models.
CSE 550 Computer Network Design
Presentation transcript:

Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University of Goias, Brazil **Department Computer Science University of Virginia

Service Overlay Networks Provisioning of end-to-end QoS across multiple autonomous systems (ASs) requires a level a cooperation that is difficult to achieve in the current architecture. Service Overlay Networks can avoid these difficulties We define a Provider Network as a value-added overlay network that supports end-to-end bandwidth guarantees to a collection of subscribers Problem studied in this paper: Building a topology for a provider network

Endsystems and Provider Nodes Provider network = Provider nodes + Endsystems Provider nodes and endsystems gain access to the Internet through ISPs Provider network buys bandwidth from ISPs and sells bandwidth guarantees to endsystems

Provider nodes, endsystems and ISPs Two provider nodes and/or endsystems can establish a link between themselves if they have a common ISP Access link Transport link

Topology Design Problem Given the connectivity of endsystems, provider nodes, and ISPs Given the bandwidth requests between endsystems How to construct a “good” topology ?

Solution to the topology of the provider network For each endsystem, select an ISP to connect endsystem to a provider node Connect provider nodes, so that there are end-to-end paths for traffic between endsystems

Resulting topology:

Formal problem statement M Number of endsystems N Number of provider nodes ES i Endsystem i PN j Provider node j α ij Cost of reserving one Mbps from ES i to PN j, through the ISP which provides the minimal cost (access cost) l ij Cost of reserving one Mbps between PN i to PN j through the ISP that provides the minimal cost of connecting the two provider nodes (transport cost) ω ij Required bandwidth from ES i to ES j Ω j Total bandwidth for traffic generated at ES j (Ω j =  j ω ij ).

Formal problem statement Each endsystem must be assigned to one provider node via an access link Provider nodes must be connected by transport links Cost of a link is weighted by the traffic sent over the link Total cost of network = Costs of the access links + transport links Goal: Minimize total cost of network

Irrespective of the amount of traffic, traffic between two provider nodes is sent at lowest cost if it is sent on the least- cost path between the two provider nodes Let r nm denote the least-cost path between PN n to PN m Cost of the least-cost path per unit of reserved bandwidth from PN n to PN m is b nm =  (ij)  r nm l ij.

Optimization problem Let y ij be a 0-1 decision variable that indicates if ES i is assigned to PN j Solving the topology design problem requires: Minimize  i  k Ω i α ik y ik +  i  j  k  l y ij y kl ω ik b jl +  j  l Ω j α jl y jl subject to  j y ij = 1 for i = 1,..,M Ingress access costs (from endsystems to provider nodes) Transport cost Egress access costs (from provider nodes to endsystems) Each endsystem is connected to one provider node

Complexity Minimize  i  k Ω i α ik y ik +  i  j  k  l y ij y kl ω ik b jl +  j  l Ω j α jl y jl subject to  j y ij = 1 for i = 1,..,M Bad news: The optimization is a variant of the NP-hard quadratic assignment problem (QAP) Good news: In some special cases, the problem can be much simplified Heuristics optimizations (e.g., simulated annealing) seem to work well for this problem

The optimization problem can be expressed as an equivalent matrix-combination problem Define: u(i) = j, iff y ij = 1. Then: u = (u(1),u(2),..,u(M)) is assignment of endsystems to provider nodes. We can write optimization as: Minimize Z(u) =  i  j ω ij (α iu(i) + b u(i)u(j) + α ju(i) ) Side conditions of the original problem are implicitly given via the definition of the u(i)´s. Finding simpler solutions Special case

Choose v(i) such that α iv(i) = min j {α ij }. Consider the following conditions: (C1) b ij ≤ b ik + b kj for all i,j,k ≤ N. (C2) α ij ≥ α iv(i) + b v(i)j for all i ≤ M and j, v(i) ≤ N. Note: (C1) always holds by construction of the least-cost paths, and (C2) is satisfied if the cost structure is such that access costs outweigh transport costs. Lemma 1. Under (C1) and (C2), Z(u) is minimized for the mapping u(i)=v(i) Finding simpler solutions: Special case

Finding simpler solutions: Heuristic solutions Without (C2), exact solutions can be obtained only for problems up to 30 endsystems and provider nodes Here, heuristic optimizations are necessary Simulated annealing has been shown to provide good results for QAP type problems. See paper for details of the simulated annealing algorithm

Finding simpler solutions: Greedy Algorithm Greedy assignment: assign endsystems to provider nodes with lowest access cost, i.e., y iv(i) =1 iff. α iv(i) = min j {α ij } When (C2) holds, greedy assignment yields the optimal solution The algorithm performs well when access costs dominate transport costs

Finding simpler solutions: Clustering Cluster endsystems into groups (regions) and assign complete regions to a provider node Rules for clustering: Endsystems that are geographically close are likely to be assigned to the same region Endsystems with higher traffic load are given more consideration when regions are being formed Use the k-means clustering algorithm to assign endsystems into regions: Input – M endsystems with position (r i,s i ) and traffic load Ω i of each endsystem ES i and number of desired regions, R. Output – R cluster centers (centroids) and assignment of each endsystem to each centroid.

Clustering Algorithm for Endsystems If R k is the set of endsystems assigned to the kth centroid, the centroid position is given by: r k =  i: ESi є Rk r i. Ω i /  i: ESi є Rk Ω i s k =  i: ESi є Sk s i. Ω i /  i: ESi є Sk Ω i After establishing the new centroid position, re-associate each endsystem with a region by reassigning each endsystem to the closest centroid, until the algorithm converges.

Numerical Evaluation Questions How well do the heuristic algorithms perform? How does cost change with the number of provider nodes? What is the impact of the clustering algorithm? Evaluation with random graphs Connectivity of provider nodes is determined by random graph (using the GT-ITM, ‘Pure Random’ model) Each endsystem can access a randomly subset of p α ·100% of provider nodes Access costs = Uniform[5,50] Transport costs = Uniform[5,50] Traffic matrix = Uniform[10,20] Mbps

Evaluation of Simulated Annealing Comparson with optimum solution for a small network (M = 9, N = 9) Repetition factor (Rep max ) controls the number of solutions evaluated by simulated annealing Conclusion: Simulated annealing seems to work well Repetition factor (Rep max ) Average deviation from minimum (%) Number of optimal solutions found (from 100) % % % % %9

Evaluation of Simulated Annealing Enforce condition (C2)  optimum solution can be computed for large networks Here: Simulated annealing always gets close to optimum solution Set: M = N Value of “Repetition Factor” (Repmax) needed to get simualted annealing within 1% of optimal solution

Evaluation of Heuristic Algorithms General network (i.e.,do not assume (C2)) Number of endsystems and provider nodes: 10 to 100 Prob. of transport link between provider nodes: P = 0.1, 0.5, 0.9. Comparison of: simulated annealing greedy algorithm random assignment

Evaluation of Heuristic Algorithms Plots show cost of network relative to “Greedy algorithm” P = 0.1P = 0.5

Impact of the Number of Provider Nodes Network with M = 100 endsystems and N= provider nodes Solution method: Simulated annealing Costs normalized to network with N=10 p  = 0.9 p  = 0.5

Impact of Clustering Network of M=100 endsystems and N= 10 provider nodes. Number of regions is 10 – 100 Solution method: Simulated annealing

Conclusions Formaluated network topology design problem for a service overlay network with QoS guarantees We showed that the general problem is NP- hard But when the underlying network satisfies certain conditions, the problem has only linear complexit Developed and evaluated several heuristic methods Caveat: Different cost structure may give different results and may require a different solution approach