Forbidden-set labelling in graphs

Slides:



Advertisements
Similar presentations
Surender Baswana Department of CSE, IIT Kanpur. Surender Baswana Department of CSE, IIT Kanpur.
Advertisements

Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
Distance and Routing Labeling Schemes in Graphs
Competitive fault tolerant Distance Oracles and Routing Schemes Weizmann Open U Weizmann Bar Ilan Shiri Chechik Michael Langberg David Peleg Liam Roditty.
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Dynamic Graph Algorithms - I
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Distributed Data Structures: A Survey Cyril Gavoille (LaBRI, University of Bordeaux)
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Traveling with a Pez Dispenser (Or, Routing Issues in MPLS) Anupam Gupta Amit Kumar FOCS 2001 Rajeev Rastogi Iris Reinbacher COMP670P
1 Approximate Distance Oracles Mikkel Thorup AT&T Research Uri Zwick Tel Aviv University.
Compact Routing Schemes Mikkel Thorup Uri Zwick AT&T Labs – Research Tel Aviv University.
Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms. Daniel Štefankovič.
Collective Additive Tree Spanners of Homogeneously Orderable Graphs
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Collective Tree Spanners of Graphs with Bounded Parameters F.F. Dragan and C. Yan Kent State University, USA.
Collective Tree Spanners of Graphs F.F. Dragan, C. Yan, I. Lomonosov Kent State University, USA Hiram College, USA.
Approximate Distance Oracles for Geometric Spanner Networks Joachim Gudmundsson TUE, Netherlands Christos Levcopoulos Lund U., Sweden Giri Narasimhan Florida.
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
Graphs – Shortest Path (Weighted Graph) ORD DFW SFO LAX
Distributed Algorithms on a Congested Clique Christoph Lenzen.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Multiple-Source Shortest Paths in Planar Graphs Allowing Negative Lengths Philip Klein Brown University.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
Transitive-Closure Spanner of Directed Graphs Kyomin Jung KAIST 2009 Combinatorics Workshop Joint work with Arnab Bhattacharyya MIT Elena Grigorescu MIT.
GRAPH SPANNERS by S.Nithya. Spanner Definition- Informal A geometric spanner network for a set of points is a graph G in which each pair of vertices is.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Some Results in Interval Routing Francis C.M. Lau HKU and ITCS Tsinghua December 2, 2007.
Approximate Distance Oracles Mikkel Thorup and Uri Zwick Presented By Shiri Chechik.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Distance and Routing Labeling Schemes in Graphs with Applications in Cellular and Sensor Networks Feodor F. Dragan Computer Science Department Kent State.
A randomized linear time algorithm for graph spanners Surender Baswana Postdoctoral Researcher Max Planck Institute for Computer Science Saarbruecken,
Various Orders and Drawings of Plane Graphs Takao Nishizeki Tohoku University.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
Stephen Alstrup (U. Copenhagen) Esben Bistrup Halvorsen (U. Copenhagen) Holger Petersen (-) Aussois – ANR DISPLEXITY - March 2015 Cyril Gavoille (LaBRI,
Distance Vector and Link State Routing Pragyaditya Das.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
Succinct Routing Tables for Planar Graphs Compact Routing for Graphs Excluding a Fixed Minor Ittai Abraham (Hebrew Univ. of Jerusalem) Cyril Gavoille (LaBRI,
Fully Dynamic Approximate Distance Oracles for Planar Graphs via Forbidden-Set Distance Labels Presented by: Shiri Chechik (Weizmann Institute) Joint with:
Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension
Ch 13 WAN Technologies and Routing
Progress and Challenges for Labeling Schemes
Labeling Schemes with Forbidden-Sets
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
Greedy Routing with Bounded Stretch
Structural graph parameters Part 2: A hierarchy of parameters
Localized Data Structures
Bart M. P. Jansen June 3rd 2016, Algorithms for Optimization Problems
Distance and Routing Labeling Schemes in Graphs
REDUCESEARCH Polynomial Kernels for Hitting Forbidden Minors under Structural Parameterizations Bart M. P. Jansen Astrid Pieterse ESA 2018 August.
Introduction Wireless Ad-Hoc Network
Compact Routing Schemes
Approximate Distance Oracles
Compact routing schemes with improved stretch
How to use spanning trees to navigate in Graphs
Routing.
Routing in Networks with Low Doubling Dimension
Distance and Routing Labeling Schemes in Graphs with Applications in Cellular and Sensor Networks Feodor F. Dragan Computer Science Department Kent State.
Presentation transcript:

Forbidden-set labelling in graphs Cyril Gavoille Bruno Courcelle Mamadou Kanté (LaBRI, Bordeaux U) Andy Twigg (Cambridge U, Thomson Research Paris)

The Compact Routing Problem Input: a network G (a connected graph) Output: a routing scheme for G A routing scheme allows any source node to route messages to any destination node, given the destination’s network identifier. Forbidden-set labelling in graphs

Ex: Grid with X,Y-coordinates (2,3) (5,8) Routes are constructed in a distributed manner … according to some local routing tables (or routing algorithms) Forbidden-set labelling in graphs

…and subgraphs of the grid? (x,y)-coordinates no longer sufficient; routing in planar graphs… (2,3) (5,8) Routes are constructed in a distributed manner … according to some local routing tables (or routing algorithms) Forbidden-set labelling in graphs

Quality & Complexity Measures Near-shortest paths: |route(x,y)| ≤ stretch . dG(x,y) Size of the labels and routing tables Goal: constant stretch & compact (polylog) tables Trivial upper bound: Each node x stores the neighbour on the next-hop towards each destination y  O(n log n) bits Forbidden-set labelling in graphs

Labeled vs. Name-independent Labeled: Node IDs can be chosen by the designer of the scheme (as a routing label whose length is a parameter) Name-independent: Node identifiers are chosen by an adversary (the input is a graph with the IDs) Name-independent is harder than labeled variant. This talk: labeled schemes only. Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Routing / distances on planar graphs Stretch-1 [Gavoille et al, J Alg ’04] Shortest-path labeled routing on weighted planar graphs requires labels of (n1/2) bits. Treewidth-k graphs have stretch-1 labeled routing schemes with O(k log2n) bit labels. For planar, k=n1/2. Stretch > 1 [Thorup ’04] Planar graphs have (1+ε)-stretch labeled routing schemes with O(ε-1 log2n) bit labels Forbidden-set labelling in graphs

Forbidden-set routing Shortest path avoiding forbidden blue nodes (2,3) (5,8) Routes are constructed in a distributed manner … according to some local routing tables (or routing algorithms) Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Forbidden-set routing Input: a network G (a connected graph) Output: a forbidden-set routing scheme for G A forbidden-set routing scheme allows any source node to route messages to any destination node v, avoiding any set X of forbidden nodes, given the identifier of v and the identifiers of nodes in X. e.g. Are u,v connected in G\X? What is dG\X(u,v)? Next hop? Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Motivation Routing around failures Routing schemes are generally static; recomputation of labels / routing tables is costly. The set X can be a set of failed nodes/edges Best known techniques only handle single failures e.g. “fast reroute”, Cisco not-via Internet routing ASes want control over where their packets travel; shortest-path routing not expressive enough BGP allows AS i to specify that its packets avoid AS j Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Known results (forbidden-set) Upper bounds O(n log n) no longer trivial! The trivial upper bound is to store the entire graph at each node  O(n2) bits. Lower bounds Distance labeling lower bounds apply (take X=Ø) i.e. Ω(n) for general graphs, Ω(n1/2) for planar, Ω(k) for twd-k Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Known results (forbidden-set) [Courcelle, T, STACS ’07] Treewidth-k & cliquewidth-k graphs: forbidden-set stretch-1 routing schemes with O(k2 log2n) bit labels. Compare to Θ(k) for vanilla routing [Gavoille, T, 2007] Planar graphs: forbidden-set stretch-1 labeled routing scheme with labels of Õ(n1/2) bits. Equals optimal bound for vanilla stretch-1 planar distances! [This paper] Planar graphs: forbidden-set connectivity labeling scheme with labels of O(log n) bits. Can u reach v in G\X? Forbidden-set labelling in graphs

Planar forbidden-set connectivity Fact: every planar graph G has a planar dual G*. A set of edges E is a cut in G iff the dual edges E* form a cycle in G*. Construct new planar graph M by subdividing edges of G* and taking union with G Associate with each edge e of G the coordinates of its dual edge M has a straight-line embedding in an n x n grid [Schneider], hence the labels are O(log n) bits Forbidden-set labelling in graphs

Planar forbidden-set connectivity Let X be a set of edges of G, and G 3-connected. u,v are reachable in G\X iff X* contains a cycle separating u,v in G* Can be extended to handle forbidden vertices Question: time to answer queries? Is O(|X|) possible? Forbidden-set labelling in graphs

Forbidden-set labelling in graphs Conclusions A new collection of problems in compact routing Open problems O(1)-stretch planar fs-routing with Õ(1) bit labels? … Simplifications? Restrict choices of X, eg |X| < k (bounded size) d(u,X) < k (bounded distance) dG\X(u,v) < k dG(u,v) (max path inflation k) Other simplifications, eg ε-slack… Forbidden-set labelling in graphs