Node-based Scheduling with Provable Evacuation Time Bo Ji Dept. of Computer & Information Sciences Temple University Joint work.

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Tradeoffs between performance guarantee and complexity for distributed scheduling in wireless networks Saswati Sarkar University of Pennsylvania Communication.
EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Approximating Maximum Edge Coloring in Multigraphs
June 3, 2015Windows Scheduling Problems for Broadcast System 1 Amotz Bar-Noy, and Richard E. Ladner Presented by Qiaosheng Shi.
Towards Simple, High-performance Input-Queued Switch Schedulers Devavrat Shah Stanford University Berkeley, Dec 5 Joint work with Paolo Giaccone and Balaji.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Algorithm Orals Algorithm Qualifying Examination Orals Achieving 100% Throughput in IQ/CIOQ Switches using Maximum Size and Maximal Matching Algorithms.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Fast Matching Algorithms for Repetitive Optimization Sanjay Shakkottai, UT Austin Joint work with Supratim Deb (Bell Labs) and Devavrat Shah (MIT)
1 Input Queued Switches: Cell Switching vs. Packet Switching Abtin Keshavarzian Joint work with Yashar Ganjali, Devavrat Shah Stanford University.
1 Ecole Polytechnque, Nov 7, 2007 Scheduling Unit Jobs to Maximize Throughput Jobs:  all have processing time (length) = 1  release time r j  deadline.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion MSM.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion Scaling.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
1 Achieving 100% throughput Where we are in the course… 1. Switch model 2. Uniform traffic  Technique: Uniform schedule (easy) 3. Non-uniform traffic,
1 Optimization and Stochastic Control of MANETs Asu Ozdaglar Electrical Engineering and Computer Science Massachusetts Institute of Technology CBMANET.
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
On Channel-Discontinuity-Constraint Routing in Multi-Channel Wireless Infrastructure Networks Abishek Gopalan, Swaminathan Sankararaman 1.
048866: Packet Switch Architectures Dr. Isaac Keslassy Electrical Engineering, Technion Scheduling.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 Scheduling Crossbar Switches Who do we chose to traverse the switch in the next time slot? N N 11.
Fair Real-time Traffic Scheduling over Wireless Local Area Networks Insik Shin Joint work with M. Adamou, S. Khanna, I. Lee, and S. Zhou Dept. of Computer.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
EE 685 presentation Distributed Cross-layer Algorithms for the Optimal Control of Multi-hop Wireless Networks By Atilla Eryılmaz, Asuman Özdağlar, Devavrat.
Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty Traffic Michael J. Neely University of Southern California INFOCOM 2008, Phoenix,
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
© 2009 IBM Corporation 1 Improving Consolidation of Virtual Machines with Risk-aware Bandwidth Oversubscription in Compute Clouds Amir Epstein Joint work.
When In-Network Processing Meets Time: Complexity and Effects of Joint Optimization in Wireless Sensor Networks Department of Computer Science, Wayne State.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling Xin Che, Xi Ju, Hongwei Zhang {chexin, xiju,
Chapter 8 PD-Method and Local Ratio (4) Local ratio This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
Incidentor coloring: methods and results A.V. Pyatkin "Graph Theory and Interactions" Durham, 2013.
Combinatorial Optimization Problems in Computational Biology Ion Mandoiu CSE Department.
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks 1 Bo Ji, 2 Changhee Joo and 1 Ness B. Shroff 1 Department of ECE, The Ohio State University.
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Joint work with.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Guaranteed Smooth Scheduling in Packet Switches Isaac Keslassy (Stanford University), Murali Kodialam, T.V. Lakshman, Dimitri Stiliadis (Bell-Labs)
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
Client Assignment in Content Dissemination Networks for Dynamic Data Shetal Shah Krithi Ramamritham Indian Institute of Technology Bombay Chinya Ravishankar.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
SNRC Meeting June 7 th, Crossbar Switch Scheduling Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Hongyu Liang Institute for Theoretical Computer Science Tsinghua University, Beijing, China The Algorithmic Complexity.
Chapter 8 PD-Method and Local Ratio (5) Equivalence This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
EE384Y: Packet Switch Architectures Scaling Crossbar Switches
Balaji Prabhakar Departments of EE and CS Stanford University
Abdul Kader Kabbani (Stanford University)
R. Srikant University of Illinois at Urbana-Champaign
IEEE Student Paper Contest
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Introduction Wireless Ad-Hoc Network
Balaji Prabhakar Departments of EE and CS Stanford University
Javad Ghaderi, Tianxiong Ji and R. Srikant
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Maximum Flow Neil Tang 4/8/2008
Lecture 28 Approximation of Set Cover
Presentation transcript:

Node-based Scheduling with Provable Evacuation Time Bo Ji Dept. of Computer & Information Sciences Temple University Joint work with Jie CISS 2015 Baltimore, Maryland March 18 th, 2015

Link Scheduling for Minimum Evacuation Time 2 Evacuation time: time needed for draining all the existing packets A critical metric in settings without future arrivals Goal: minimize the evacuation time In settings with arrivals, a good measure of short-term throughput & closely related to the delay performance Multigraph Edge Coloring Problem multi-edge = packet color = matching Multihop wireless networks Unit link capacities Single-hop traffic flows One-hop interference model: feasible schedule = matching Ex.: Bluetooth, FH-CDMA, etc.

Multigraph Edge Coloring Problem 3 The problem is generally NP-hard [Holyer’81] Approximations Shannon’s theorem [Shanon’49], Vizing’s theorem [Vizing’64], … Any constant-factor approximation ratio better than 4/3 is NP-hard [Holyer’81] If a small additive term is allowed, much better approximations (exact or asymptotic) [Sanders & Steurer’08,…] A survey book on graph edge coloring [Stiebitz et al.’12] Limitations All rely on recoloring-based techniques The colors (or schedules) are computed all at once The complexity depends on # of multi-edges (or # of packets) Could be impractically high Unsuitable for link scheduling and packet evacuation More limited applications to settings with arrivals

Online Algorithms 4 Quickly compute one color (or schedule) at a time Complexity is only dependent on network size Link count and node count High complexity is distributed over time Desirable for applications such as link scheduling Functional even if packet arrivals are considered Example algorithms Maximum Weighted Matching (MWM) algorithm MWM-α algorithm Greedy Maximal Matching (GMM) algorithm Randomized Maximal Matching (RMM) algorithm Existing online algorithms all have an approximation ratio no better than 2! [Gupta et al.’09] Edge-based Load-agnostic

Node-based Approach 5 Input-queued switches Modeled as bipartite graphs A class of Lazy Heaviest Port First (LHPF) algorithms [Gupta et al.’09] Maximum Vertex-weighted Matching (MVM), also known as Longest Port First algorithm [Mekkittikul & McKeown’98] Maximum Node Containing Matching algorithm [Tabatabaee & Tassiulas’09] LHPF is both evacuation-time-optimal and throughput-optimal Multihop wireless networks Modeled as general graphs Evacuation-time performance is largely unknown Our focus: develop and analyze node-based scheduling algorithms with provable evacuation time and lower complexity

Our Contributions 6 Prove that MVM has an approximation ratio no greater than 3/2 in multihop wireless networks Propose a new node-based algorithm – Critical Node Matching (CNM) algorithm CNM guarantees an approximation ratio no greater than 3/2 as well CNM has a lower complexity of O(m √n) than O(m √n logn) of MVM, where m and n are the link count and the node count, respectively As a byproduct, these algorithms serve as an alternative for achieving Shannon’s bound of 3/2 Δ, where Δ is the maximum node degree

MVM 7 : # of packets waiting to be transmitted over link l : set of links incident to node i : degree of node i : matching : set of all the matchings MVM: : weight of node i : weight of matching M : Maximum Vertex-weighted Matching The MVM algorithm finds an MVM in each time slot MVM has a complexity of O(m √n logn)

MVM - Example Q l = d i =2 MVM MWM, GMM, MWM-α with α> w i = w l =2

Main Result 9 Theorem 1: MVM has an approximation ratio no greater than 3/2. Proof Sketch: Minimum evacuation time ≥ maximum node degree = Δ MVM achieves Shannon’s bound Evacuation time of MVM ≤ 3/2 Δ (Proposition 1) Proposition 1: Suppose the maximum node degree is no smaller than two. Under the MVM algorithm, the maximum node degree decreases by at least two within every three consecutive time-slots.

Proof Sketch of Proposition 1 10 Proposition 1: Suppose the maximum node degree is no smaller than two. Under the MVM algorithm, the maximum node degree decreases by at least two within every three consecutive time-slots. Proof Sketch: If the maximum node degree does not decrease in a time-slot, it will decrease in both of the following two time-slots Critical node: Node having a maximum degree Lemma 1: If the subgraph induced by all the critical nodes is bipartite, then there exists a matching that matches all the critical nodes [Anstee & Griggs’96] Lemma 2: If there exists a matching that matches all the critical nodes, then MVM will match all of them as well In both of the following two time-slots, the subgraph included by all the critical nodes is indeed bipartite Observation: in order to achieve 3/2, it is sufficient to focus on scheduling the critical nodes

CNM – Lower Complexity MVM 11 Critical Node Matching (CNM) algorithm Motivated by the key observation, focus on scheduling the critical nodes Assign node weights as follows:, if i is a critical node, otherwise, both B 1 and B 2 are bounded positive integer Find an MVM based on the new weights in each time-slot An implementation with O(m √n) complexity for bounded integer weights [Huang & Kavitha’12, Pettie’12] Theorem 2: CNM has an approximation ratio no greater than 3/2.

CNM - Example Q l = d i =2 MVM (also CNM) 4 54 w i =2 3 CNM (B 1 =1, B 2 =2) w i =1 1

Lower Bound of 4/3 13 First time-slot, second, third, and fourth. MVM & CNM: 4 slots Optimal: 3 slots

Throughput & Delay Performance 14 Simulation settings 4X4 grid network unit link capacity A flow with arrival rate λ at each link Observations MVM & CNM both empirically achieve good throughput performance MVM empirically achieves best delay performance

Conclusion 15 Proved that MVM achieves an approximation ratio no greater than 3/2 for the minimum evacuation time problem By making a key observation that it is sufficient to focus on scheduling the critical nodes for achieving an approximation ratio no greater than 3/2, we proposed a lower-complexity algorithm – CNM – with a same performance guarantee These algorithms serve as an alternative for achieving Shannon’s bound Node-based approach is less studied Performance limits of the node-based algorithms? Conjecture: 4/3 is tight for MVM (and CNM) – much more challenging If an additive term is allowed, can we develop node-based algorithms with better approximations (exact or asymptotic)? Throughput performance in settings with arrivals?