1 Near-Optimal Hot-Potato Routing on Trees Costas Busch Rensselaer Polytechnic Inst. Malik Magdon Ismail Rensselaer Polytechnic Inst. Marios Mavronicolas.

Slides:



Advertisements
Similar presentations
1 Atomic Routing Games on Maximum Congestion Costas Busch Department of Computer Science Louisiana State University Collaborators: Rajgopal Kannan, LSU.
Advertisements

Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Undirected: Optic Fiber.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
1 A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window Costas Busch Rensselaer Polytechnic Institute Srikanta Tirthapura.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
1 Internet Networking Spring 2006 Tutorial 6 Network Cost of Minimum Spanning Tree.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
1 Fault-Tolerant Consensus. 2 Failures in Distributed Systems Link failure: A link fails and remains inactive; the network may get partitioned Crash:
ETH Zurich – Distributed Computing Group Jasmin Smula 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer Distributed Computing Group MLS.
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
NetworkModel-1 Network Optimization Models. NetworkModel-2 Network Terminology A network consists of a set of nodes and arcs. The arcs may have some flow.
UCSC 1 Aman ShaikhICNP 2003 An Efficient Algorithm for OSPF Subnet Aggregation ICNP 2003 Aman Shaikh Dongmei Wang, Guangzhi Li, Jennifer Yates, Charles.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Time-Constrained Flooding A.Mehta and E. Wagner. Time-Constrained Flooding: Problem Definition ●Devise an algorithm that provides a subgraph containing.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
and 6.855J The Capacity Scaling Algorithm.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Optimal Oblivious Routing in Hole-Free Networks Costas Busch Louisiana State University Malik Magdon-Ismail Rensselaer Polytechnic Institute.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 Permutation routing in n-cube. 2 n-cube 1-cube2-cube3-cube 4-cube.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
50 th Annual Allerton Conference, 2012 On the Capacity of Bufferless Networks-on-Chip Alex Shpiner, Erez Kantor, Pu Li, Israel Cidon and Isaac Keslassy.
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Costas Busch (RPI) Srikanth Surapaneni (RPI) Srikanta Tirthapura (Iowa State University)
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
1 Costas Busch Õ(Congestion + Dilation) Hot-Potato Routing on Leveled Networks Costas Busch Rensselaer Polytechnic Institute.
© 2009 Ilya O. Ryzhov 1 © 2008 Warren B. Powell 1. Optimal Learning On A Graph INFORMS Annual Meeting October 11, 2009 Ilya O. Ryzhov Warren Powell Princeton.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
1 Routing without Flow Control Costas Busch Rensselaer Polytechnic Institute Maurice Herlihy Brown University Roger Wattenhofer Microsoft Research.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
1 Concurrent Counting is harder than Queuing Costas Busch Rensselaer Polytechnic Intitute Srikanta Tirthapura Iowa State University.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Hard-Potato Routing Costas Busch, Maurice Herlihy, and Roger Wattenhofer Brown University.
ETH Zurich – Distributed Computing – Klaus-Tycho Förster, Ratul Mahajan, and Roger Wattenhofer Consistent Updates in Software Defined.
Data Center Network Architectures
Shortest Path from G to C Using Dijkstra’s Algorithm
Efficient Bufferless Routing on Leveled Networks Costas Busch Shailesh Kelkar Malik Magdon-Ismail Rensselaer Polytechnic Institute.
THE NETWORK LAYER.
ECE 544 Protocol Design Project 2016
Analysis of Link Reversal Routing Algorithms
Greedy Routing with Bounded Stretch
ECE 544 Protocol Design Project 2016
Minimum Spanning Tree.
Introduction Wireless Ad-Hoc Network
Universal Bufferless Routing
Routing Flooding, Link-State EE122 Section 4.
Presentation transcript:

1 Near-Optimal Hot-Potato Routing on Trees Costas Busch Rensselaer Polytechnic Inst. Malik Magdon Ismail Rensselaer Polytechnic Inst. Marios Mavronicolas University of Cyprus Roger wattenhofer ETH Zurich

2 Trees Trees are important in many networks (i.e. spanning trees)

3 Routing on Trees Every node generates at most one packet Packets follow shortest paths

4 Synchronous network Network Model One packet per time step Bi-directional links

5 Buffer-less nodes Time 0 Hot-Potato Routing

6 conflict Time 1

7 deflected Time 2

8 Time 3

9 Time 4

10 Hot-potato routing is interesting: Optical networks Simple hardware implementations Works well in practice: Bartzis et al.: EUROPAR 2000 Maxemchuck: INFOCOM 1989

11 Objective: Find hot-potato algorithm which minimizes routing time The time until the last packet is delivered to its destination

12 Congestion: Maximum numbers of packets that share an edge

13 Dilation: Maximum path length

14 A lower bound on Routing Time: Congestion+Dilation We want to find an algorithm close to this lower bound

15 Our contributions: Deterministic Algorithm: node degree network size Randomized Algorithm: degree independent

16 Related Work for Trees Matching Routing [ACG94] [PRS97] [Z97] Direct Routing [AHLT98][BMMS04] Hot-Potato routing [RSW00] Most results have routing time O(n) (worst case bound for O(C+D))

17 Presentation Outiline Deterministic Algorithm Randomized Algorithm

18 Deterministic Algorithm 1. Divide time into phases according to short nodes 2. At each phase send packets to their destinations greedily

19 every subtree has at most nodes Short Node: ……

20 short node Example

21 Phase 1: …… Route packets that cross the short node

22 Phase 2: …… In each subtreeget the short nodes

23 Phase 2: …… In each subtreeget the short nodes

24 Phase 2: Route packets that cross the short nodes …………

25 There are at most phases

26 Phase k: …… Route packets that cross the short node Bound on number of packets:

27 A packet follows its path greedily Phase k:

28 conflict However, packets can conflict and get deflected deflected

29 Deflection Sequence If a packet is deflected then some other packet reaches its destination [Borodin, Rabani, Schieber 1997]

30 Since there are at most packets, there are at most deflections Worst Routing Time for a packet: deflectionsInitial distance

31 Total Routing Time Packet time In a phase Number of Phases

32 Presentation Outiline Deterministic Algorithm Randomized Algorithm

33 Randomized Algorithm Same with deterministic algorithm, with only difference: Packet conflicts are resolved according to random packet priorities

34 Packet Priorities: Low: each packet starts with a low priority High: when a packet is deflected it increases its priority with probability

35 A high priority packet can conflict with at most packets …… From those packets, are expected to be in high priority

36 A high priority packet successfully reaches its destination with probability Thus attempts to become high priority are enough.

37 Total Routing Time Packet time In a phase Number of Phases

38 Discussion We presented two near-optimal hot-potato algorithms for trees (within logarithmic factors from optimal) Open problem: Remove the logarithmic factors