Non-Preemptive Buffer Management for Latency Sensitive Packets Moran Feldman Technion Seffi Naor Technion.

Slides:



Advertisements
Similar presentations
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Advertisements

A Primal-Dual Approach to Online Optimization Problems.
Tight Bounds for Online Class- constrained Packing Hadas Shachnai Bell Labs and The Technion IIT Tami Tamir The Technion IIT.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Online Algorithms Amrinder Arora Permalink:
Institute of Computer Science University of Wroclaw Geometric Aspects of Online Packet Buffering An Optimal Randomized Algorithm for Two Buffers Marcin.
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches Marcin Bieńkowski.
Dynamic Wavelength Allocation in All-optical Ring Networks Ori Gerstel and Shay Kutten Proceedings of ICC'97.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
1 Ecole Polytechnque, Nov 7, 2007 Scheduling Unit Jobs to Maximize Throughput Jobs:  all have processing time (length) = 1  release time r j  deadline.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
April 10, HOL Blocking analysis based on: Broadband Integrated Networks by Mischa Schwartz.
Competitive Buffer Management with Packet Dependencies Alex Kesselman, Google Boaz Patt-Shamir, Tel Aviv University Gabriel Scalosub, University of Toronto.
Online Algorithms Motivation and Definitions Paging Problem Competitive Analysis Online Load Balancing.
Energy-Efficient Rate Scheduling in Wireless Links A Geometric Approach Yashar Ganjali High Performance Networking Group Stanford University
October 5th, 2005 Jitter Regulation for Multiple Streams David Hay and Gabriel Scalosub Technion, Israel.
Competitive Buffer Management with Packet Dependencies Alex Kesselman, Google Boaz Patt-Shamir, Tel Aviv University Gabriel Scalosub, University of Toronto.
Randomized Competitive Analysis for Two Server Problems Wolfgang Bein Kazuo Iwama Jun Kawahara.
Evaluation of Algorithms for the List Update Problem Suporn Pongnumkul R. Ravi Kedar Dhamdhere.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Online Packet Switching Techniques and algorithms Yossi Azar Tel Aviv University.
Incentive-compatible Approximation Andrew Gilpin 10/25/07.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Online Function Tracking with Generalized Penalties Marcin Bieńkowski Institute of Computer Science, University of Wrocław, Poland Stefan Schmid Deutsche.
 On-line problem  Input arrives one at a time, and a decision is made (and cannot be changed).  In the minADM problem: lightpaths arrive one at a time,
Localized Asynchronous Packet Scheduling for Buffered Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York Stony Brook.
1/24 Algorithms for Generalized Caching Nikhil Bansal IBM Research Niv Buchbinder Open Univ. Israel Seffi Naor Technion.
Queuing Networks. Input source Queue Service mechanism arriving customers exiting customers Structure of Single Queuing Systems Note: 1.Customers need.
Competitive On-Line Admission Control and Routing By: Gabi Kliot Presentation version.
Throughput Competitive Online Routing Baruch Awerbuch Yossi Azar Serge Plotkin.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
© 2009 IBM Corporation 1 Improving Consolidation of Virtual Machines with Risk-aware Bandwidth Oversubscription in Compute Clouds Amir Epstein Joint work.
Scheduling policies for real- time embedded systems.
Department of Computer Science Stanley P. Y. Fung Online Preemptive Scheduling with Immediate Decision or Notification and Penalties.
1 Chapters 8 Overview of Queuing Analysis. Chapter 8 Overview of Queuing Analysis 2 Projected vs. Actual Response Time.
1 Tight Bounds for Delay-Sensitive Aggregation Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer Distributed Computing Group LEA.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
Randomized Composable Core-sets for Submodular Maximization Morteza Zadimoghaddam and Vahab Mirrokni Google Research New York.
Jennifer Campbell November 30,  Problem Statement and Motivation  Analysis of previous work  Simple - competitive strategy  Near optimal deterministic.
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
Loss-Bounded Analysis for Differentiated Services. By Alexander Kesselman and Yishay Mansour Presented By Sharon Lubasz
Submodular Maximization with Cardinality Constraints Moran Feldman Based On Submodular Maximization with Cardinality Constraints. Niv Buchbinder, Moran.
Frequency Capping in Online Advertising Moran Feldman Technion Joint work with: Niv Buchbinder,The Open University of Israel Arpita Ghosh,Yahoo! Research.
Improved Competitive Ratios for Submodular Secretary Problems ? Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
A Unified Continuous Greedy Algorithm for Submodular Maximization Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
Maximization Problems with Submodular Objective Functions Moran Feldman Publication List Improved Approximations for k-Exchange Systems. Moran Feldman,
Deterministic Algorithms for Submodular Maximization Problems Moran Feldman The Open University of Israel Joint work with Niv Buchbinder.
International Graduate School of Dynamic Intelligent Systems, University of Paderborn Fighting Against Two Adversaries: Page Migration in Dynamic Networks.
Buffering problems Moran Feldman Technion Based on joint work with Seffi Naor.
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
Competitive Queueing Policies for QoS Switches Nir Andelman Yishay Mansour An Zhu TAUTAUStanford.
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
Routing and Switching Fabrics
Deadline Scheduling and Heavy tail distributionS
Maximum Matching in the Online Batch-Arrival Model
The Byzantine Secretary Problem
Routing and Switching Fabrics
Submodular Maximization with Cardinality Constraints
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches
Presentation transcript:

Non-Preemptive Buffer Management for Latency Sensitive Packets Moran Feldman Technion Seffi Naor Technion

Outline Model and motivation Prior art and our results Focusing on results: – Lower bound for Unrestricted Model – Deterministic algorithm for Integral Valued Model – Randomized algorithm for Real Valued Model Open problems 2

Motivation Consider a path in a communication network: 3 Router A packet going through the path often has a deadline. The deadline refers to the arrival of the packet to its destination. An online model of a router must deal with these deadlines: ‐Traditional models assume a deadline for leaving the router. ‐A new model (proposed by Fiat, Mansour and Nadav [SODA 2008]), associates each packet with a value that diminishes over time.

2 The Model Our model is based on the model of Fiat et. al. 4 Router’s queue Unlimited size Packets Arrive online, each has an associated value w(d). Must be rejected or accepted immediately. Time Continues, starting at time 0 Packets arrive at fractional times and are transmitted at integral ones. At each integral time the first packet of the queue is transmitted. Its revenue is w(d) minus the delay it suffered in the queue. 43

Competitive Ratio Standard performance measure for online algorithms. Notation I – An instance of an online problem. ALG( I ) – The value of an online algorithm ALG on I. OPT( I ) – The value of the optimal offline algorithm on I. 5 For Deterministic AlgorithmsFor Randomized Algorithms Against oblivious adversary. Other adversary types also exist. Randomization often improves the achievable competitive ratio.

Known and New Results Sub models Unrestricted model – A packet can have any positive value. Real valued model – A packet can have any value ≥ 1. Integral valued model – A packet can have any positive integral value. 6 Unrestricted Model Real Valued Model Integral Valued Model Deterministic Lower bound 333 Upper bound Randomized Lower bound φ ≈ Upper bound Known results inferred from Fiat et. al. Unrestricted Model Real Valued Model Integral Valued Model Deterministic Lower bound ∞ (3)φ 3 ≈ (3)4 (3) Upper bound (4.24) Randomized Lower bound ∞ (φ)4 (φ) Upper bound -4 (4.24) New results appear in red.

Unrestricted Model – Lower Bound Consider any algorithm ALG and a constant c. Our job: Show that ALG is not c-competitive. Plan of Adversary 1.For i = 1 to 2c do: 2.Give ALG a packet of value (1/2c) 2c+1-i. 3.If the probability that ALG accepted any packet, so far, is less than i/2c, terminate. 4.Give ALG a packet of value 1. Proof Idea Packets have exponentially increasing values, but all values are at most 1, so only one packet gives revenue. ALG must accept each packet with some probability. OPT accepts with probability 1 the last packet. 7

The Dual-Fitting Method Offline Primal Program 8 y(d,t) – Indicates whether packet d was transmitted at time t. w(d) – The value of packet d. a(d) – The time when packet d arrived. Remark The LP contains no FIFO constraint because this is no constraint from the offline point of view.

The Dual-Fitting Method (cont.) 9 Offline Dual Program Method Every dual solution is an upper bound on OPT. To show that an algorithm is c-competitive we do the following:  Consider any input sequence σ.  Calculate the revenue R σ of the algorithm on σ.  Find a dual solution of value D σ for σ.  Prove that D σ /R σ ≤ c.

Deterministic Reduction to Simple Inputs Definition An input sequence is simple if all packets in it arrive before time Reduction If there is a deterministic R-competitive algorithm A on simple input sequences, then there exists a deterministic R-competitive algorithm B on all input sequences. Definition of B B’s Input: A’s Input: 1.B simulates A and maps each input packets to A’s input.2.Map each packet to time before time 1, and increase its value by the number of transmissions so far Reset the algorithm when the queue empties.

Deterministic Reduction to Simple Inputs (cont.) Why Does It Work? Let an interval be the time between two consecutive resets. B (and A) transmit packets at all integral times in an interval. Moving packets to earlier time: – Does not effect the transmission times. – Increase the delay that the packets suffer. Increasing the value of the packets counter the additional delay

Deterministic Algorithm for Integral Simple Inputs Algorithm (NDT) 1.Let Q be the number of packets in the router’s queue. 2.Accept a new packet d if and only if w(d) ≥ 2Q Remark The algorithm also works for general integral inputs, although it is more difficult to show that. Reduction Assume that if a packet d is accepted, then its value is exactly 2Q+1. Proof This is the lowest value that will get the packet accepted.

Analyzing NDT Assume k packets have been received: 13 Value for the Algorithm Packet Value Delay Assignment to the Dual LP z d = 0x t = max{2k - t, 0} Value of solution: The competitive ratio of NDT is:

Randomized Reduction to Simple Inputs Difficulty The previous reduction does not work for randomized algorithms: If we restart each time the queue empties, the simulated algorithm A will face a non-oblivious adversary. If we do not restart, the algorithm will not necessarily have a packet to send at each integral time of an interval. 14 Definition A randomized algorithm is good if at all times an external observer can give a number P such that: The algorithm has either P or P+1 packets in its queue. P does not depend on the random decisions of the algorithm. Remark In a sense, a good algorithm is a randomized algorithm with minimal randomness.

Randomized Reduction to Simple Inputs (cont.) 15 Idea We reset A’s simulation after every integral time in which we might not have a packet to transmit. This ensures that the queue is empty after every reset. Either: – The queue was empty before the integral time. – The last packet was sent during the integral time. A faces an oblivious adversary. – The reduction does not depend on A’s randomized decisions. The algorithm transmits at each integral time between resets. Objective Make the previous reduction work for good randomized algorithms.

Randomized Algorithm for Real Valued Simple Inputs Algorithm (RNDT) 1.Let Q be a random variable of the size of the queue. 2.Keep the invariant Q =  E(Q)  or Q =  E(Q) . 3.Accept a new packet d with probability: To keep the invariant, true acceptances probability depends on the random variable Q. 16 d first packetw(d) ≤ 2E(Q)+0.52E(Q)+0.5 ≤ w(d) ≤ 2E(Q)+2.5w(d) ≥ 2E(Q)+2.5 ½0w(d) / 2 – 0.25 – E(Q)1 Reduction Let E f be the final value of E[Q]. No packet had value over 2E f + ½. Proof Implied by the acceptance probabilities.

Analyzing RNDT 17 Value for the Algorithm First Packet A packet of value 2E[Q]+0.5+ε is accepted to ε extent. Assignment to the Dual LP z d = 0x t = max{2E f t, 0} Value of solution: The competitive ratio of RNDT is:

Open Problems Adversary that draws from a malicious distribution. – Competitive analysis provides too pessimistic a view. – Classic queuing theory analyzes Poisson distributed source. – Provides a middle ground between the two approaches. A sub-model where all values above some constant c are allowed. – Generalizes the unrestricted and real-valued models. – The constant c represent the ratio between the shortest deadlines and the speed of the network. – The main question is finding the relation between c and the competitive ratio. 18

19