Competitive On-Line Admission Control and Routing By: Gabi Kliot Presentation version.

Slides:



Advertisements
Similar presentations
6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Online Mechanism Design (Randomized Rounding on the Fly)
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Prompt Mechanisms for Online Auctions Speaker: Shahar Dobzinski Joint work with Richard Cole and Lisa Fleischer.
3/17/2003Tucker, Applied Combinatorics Section 4.2a 1 Network Flows Michael Duquette & Whitney Sherman Tucker, Applied Combinatorics, Section 4.2a, Group.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Institute of Computer Science University of Wroclaw Geometric Aspects of Online Packet Buffering An Optimal Randomized Algorithm for Two Buffers Marcin.
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches Marcin Bieńkowski.
Dynamic Wavelength Allocation in All-optical Ring Networks Ori Gerstel and Shay Kutten Proceedings of ICC'97.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Online Algorithms Motivation and Definitions Paging Problem Competitive Analysis Online Load Balancing.
Energy-Efficient Rate Scheduling in Wireless Links A Geometric Approach Yashar Ganjali High Performance Networking Group Stanford University
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
A Distributed Algorithm for Minimum-Weight Spanning Trees by R. G. Gallager, P.A. Humblet, and P. M. Spira ACM, Transactions on Programming Language and.
Distributed Combinatorial Optimization
The Byzantine Generals Strike Again Danny Dolev. Introduction We’ll build on the LSP presentation. Prove a necessary and sufficient condition on the network.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Online Packet Switching Techniques and algorithms Yossi Azar Tel Aviv University.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
International Graduate School of Dynamic Intelligent Systems, University of Paderborn Improved Algorithms for Dynamic Page Migration Marcin Bieńkowski.
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
Online Packet Admission and Oblivious Routing in Sensor Networks Mohamed Aly Department of Computer Science University of Pittsburgh And John Augustine.
Throughput Competitive Online Routing Baruch Awerbuch Yossi Azar Serge Plotkin.
Guy Even & Moti Medina EE Tel-Aviv University Gregor Schaffrath & Stefan Schmid Deutsche Telekom Labs, TU Berlin.
Network Aware Resource Allocation in Distributed Clouds.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Online Social Networks and Media
1 WEEK 11 Graphs III Network Flow Problems A Simple Maximum-Flow Algorithm Izmir University of Economics.
Maximum Flow Problem (Thanks to Jim Orlin & MIT OCW)
Multimedia and QoS#1 Quality of Service Support. Multimedia and QoS#2 QOS in IP Networks r IETF groups are working on proposals to provide QOS control.
15.082J and 6.855J March 4, 2003 Introduction to Maximum Flows.
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
Loss-Bounded Analysis for Differentiated Services. By Alexander Kesselman and Yishay Mansour Presented By Sharon Lubasz
Improved Competitive Ratios for Submodular Secretary Problems ? Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
and 6.855J March 6, 2003 Maximum Flows 2. 2 Network Reliability u Communication Network u What is the maximum number of arc disjoint paths from.
Non-Preemptive Buffer Management for Latency Sensitive Packets Moran Feldman Technion Seffi Naor Technion.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Buffering problems Moran Feldman Technion Based on joint work with Seffi Naor.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
P & NP.
Independent Cascade Model and Linear Threshold Model
Randomized Queue Management for DiffServ
Independent Cascade Model and Linear Threshold Model
Introduction to Maximum Flows
Elastic Task Model For Adaptive Rate Control
Coverage Approximation Algorithms
Introduction Wireless Ad-Hoc Network
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
and 6.855J March 6, 2003 Maximum Flows 2
The Price of Routing Unsplittable Flow
Independent Cascade Model and Linear Threshold Model
Integer and fractional packing of graph families
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches
Presentation transcript:

Competitive On-Line Admission Control and Routing By: Gabi Kliot Presentation version

Admission control and virtual circuit routing Competitive analysis AAP algorithm Lower bound on unlimited deterministic alg (Routing on the line) Randomized competitive algorithms Randomized Base Tree call-control algorithm “Classify and Randomly Select” algorithm Applications of “CRS” on different parameters Outline:

Virtual Circuit Routing Virtual Circuit Routing: In order to use the network (transmit video..) the user requests a “virtual” connection to be established between source and destination. This guarantee is critical for real-time applications. Although the rate of information through such a connection might vary in time, the network has to guarantee that the connection will support at least the bit rate that was agreed upon during the connection establishment. This guarantee is critical for real-time applications. In other words, establishing a connection corresponds to reserving the requested bandwidth along some path on the network. Admission Control Admission Control: Algorithm that decides which requests to satisfy and which to reject and determines the route.

Competitive analysis Cost problem: Benefit problem:

Network Model G=(V,E)|V|=n Capacity represents edge maximum bandwidth Call Each call can be admitted or rejected No preemption of the calls The goal is to maximize the benefit of the admitted calls of the admitted calls

AAP can deal with arbitrary parameters, but requires the rate of each call to be a “small fraction” of edge capacity AAP algorithm ( AAP algorithm (Awerbuch, Azar, Plotkin ) Goal: Goal:

AAP algorithm – Definitions:

AAP algorithm Intuition: we route only only on edges, whose relative load is small – only on edges not close to be saturated; That way we spread the bandwidth of admitted calls “equally”. rjrj

What should be proved: What should be proved: Advantages of AAP: Advantages of AAP: – Applies to all networks – Deterministic Disadvantages of AAP: Disadvantages of AAP: – No single communication request can require more then 1/log(n) of the capacity of a single edge.

There is a lower bound of on the competitive ratio of general deterministic on-line call-control algorithm (no assumptions) How do we measure lower bounds? How do we measure lower bounds? adversary algorithm We use an adversary algorithm, that presents the worst to the ALG, making him act badly, while OPT can still act well. Lower bound on AAP: Lower bound on AAP: It can be proved that any on-line algorithm has competitive ratio of even if all requested rates are very small (like AAP) Lower bounds

Routing on the line: I. II. n123n-1 There is a need for randomized algorithm !!!

expected benefit When considering a randomized on-line algorithm, the benefit gained by algorithm is the expected benefit, where the expectation is taken over the random choices of the algorithm. We analyze our algorithm against adversary (worst). Randomized on-line algorithm

Base Tree Algorithm: Goal: Goal: maximize the number of edge-disjoint admitted calls The Base Tree Alg is O(log(n)) competitive Assumptions: Assumptions:

The Randomized Base Tree alg. Classify all edges into maximum log(n) classes; Let N be the maximum assigned level to the edge of the tree. Select uniformly with probability 1/N one of the classes Apply greedy algorithm to the calls from that class, ignoring all others

Classification Algorithm:

The above algorithm classifies the calls into O(log(n)) disjoint classes Example: Classification Algorithm:

Claim 1: Claim 1: Any 2 nodes in the same class are separated by a node of a lower-numbered level Claim 2: Claim 2: Let p be a call of class l. Then there are at most 2 edges of level l included in p. Proof: Proof: jklilllllm SD lll Lemma Lemma: The on-line alg applied to the calls of a single class is 2-competitive.

Claim 3: Claim 3: Let P be a set of paths of the same level l sharing an edge. Then, all paths of P share a level l edge. Proof: Proof: Vp l l Vq p q l l p q V m

Proof of the lemma 1 Proof of the lemma 1: Let p be a call not accepted by our alg, that is, when arrives there is already a call q that was accepted and intersects p. Then p and q share an edge of level l. There can be at most 2 such edges, so OPT can accept at most 2 calls instead of p, while ALG may accept only one. Lemma Lemma: The on-line alg applied to the calls of a single class is 2-competitive.

The Randomized Base Tree alg. Theorem: Theorem: The Base algorithm is O(log(n)) competitive. Proof: Proof: Again, It can be shown using the structure called “adversary tree” the lower bound of on the competitive ratio of any online randomized alg.

Bibliography: “Throughput-Competitive On-Line Routing”, B. Awerbuch, Y. Azar, S. Plotkin “Competitive Non-Preemptive Call Control”, B. Awerbuch, Y. Bartal, A. Fiat, A. Rosen. “Online Computation and Competitive Analysis”, Allan Borodin & Ran El-Yaniv

Goal Goal : deal with arbitrary call benefits, rates and durations. “ Classify and Randomly Select ” Let A’ be C-competitive alg tolerating values of some parameter p that differs by a factor at most 2 We define a randomized alg A’’. A’’ is O(C*log(M)) competitive The introduction of each additional varying parameter increases the competitive ratio by a factor of O(log(M))

A’’ creates in on-line manner at most L classes, selects one and uses A’ while presenting to it all calls of the selected class “ Classify and Randomly Select ” parameter p of A’’: parameter p of A’’: Define L=log(M)

Theorem: Proof: “ Classify and Randomly Select ” A’ is C-competitive

arbitrary benefits Any C-competitive call control alg for equal benefits can be transformed into O(C*log(M)) competitive randomized alg for the call control problem with arbitrary benefits. arbitrary durations Any C-competitive call control alg that handles infinite durations can be transformed into 2C competitive randomized alg to handle durations that vary by a factor of at most 2, and can be transformed into O(C*log(T)) competitive randomized alg for arbitrary durations. rates Same for rates. Applications of “ Classify and Randomly Select ” We improve now our base alg to be O(log(n)) competitive, even if rates vary by a factor of at most 2.

Lemma Lemma: If all calls have rate r such that, for some, then greedy on-line alg applied to the calls of single class l defined in the base alg, is 6 competitive. Proof Proof: - Let p be a call of rate r nor accepted by greedy alg. That is, there is an edge such that when p arrives the sum of the rates of the accepted calls that include e is greater than 1-r. -Consider the accepted calls that include e and p; they all of the same level l and share a level l edge. -ALG has accumulated at least benefit till far due to the calls passing on e (the minimum load that can overload e). -On the other hand OPT can accept at most additional calls including this level l edge.

Cont. Proof Cont. Proof: - OPT can accept at most what ALG accepts + on each level l edge of p. There are at most 2 level l edges included in p, so: