Building Edge-Failure Resilient Networks Chandra Chekuri Bell Labs Anupam Gupta Bell Labs ! CMU Amit Kumar Cornell ! Bell Labs Seffi Naor, Danny Raz Technion.

Slides:



Advertisements
Similar presentations
Iterative Rounding and Iterative Relaxation
Advertisements

C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Primal-Dual Algorithms for Connected Facility Location Chaitanya SwamyAmit Kumar Cornell University.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
All-or-Nothing Multicommodity Flow Chandra Chekuri Sanjeev Khanna Bruce Shepherd Bell Labs U. Penn Bell Labs.
EMIS 8373: Integer Programming Valid Inequalities updated 4April 2011.
Piyush Kumar (Lecture 6: MaxFlow MinCut Applications)
Approximation Some Network Design Problems With Node Costs Guy Kortsarz Rutgers University, Camden, NJ Joint work with Zeev Nutov The Open University,
Approximating the Traffic Grooming Problem Mordo Shalom Tel Hai Academic College & Technion.
Chapter 7 Maximum Flows: Polynomial Algorithms
Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design Problems Mohammad R. Salavatipour Department of Computing Science University of Alberta.
Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design Problems Guy Kortsarz Rutgers University, Camden, NJ Joint work with C. Chekuri (Bell.
Oblivious Routing for the L p -norm Matthias Englert Harald Räcke 1.
Instructor Neelima Gupta Table of Contents Lp –rounding Dual Fitting LP-Duality.
1 Approximation Algorithms for Demand- Robust and Stochastic Min-Cut Problems Vineet Goyal Carnegie Mellon University Based on, [Golovin, G, Ravi] (STACS’06)
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
A Constant Factor Approximation Algorithm for the Multicommodity Rent-or-Buy Problem Amit Kumar Anupam Gupta Tim Roughgarden Bell Labs CMU Cornell joint.
Approximation Algorithm: Iterative Rounding Lecture 15: March 9.
Network Design Adam Meyerson Carnegie-Mellon University.
Single Sink Edge Installation Kunal Talwar UC Berkeley.
Robust Network Design with Exponential Scenarios By: Rohit Khandekar Guy Kortsarz Vahab Mirrokni Mohammad Salavatipour.
An Approximation Algorithm for Requirement cut on graphs Viswanath Nagarajan Joint work with R. Ravi.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Facility Location with Nonuniform Hard Capacities Tom Wexler Martin Pál Éva Tardos Cornell University ( A 9-Approximation)
Primal-Dual Algorithms for Connected Facility Location Chaitanya SwamyAmit Kumar Cornell University.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract.
Facility Location with Nonuniform Hard Capacities Martin Pál Éva Tardos Tom Wexler Cornell University.
1 Introduction to Approximation Algorithms Lecture 15: Mar 5.
ESA 2003M. Pál. Universal Facility Location1 Universal Facility Location Mohammad Mahdian MIT Martin Pál Cornell University.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
1 Distributed Computing Optical networks: switching cost and traffic grooming Shmuel Zaks ©
LP-Based Algorithms for Capacitated Facility Location Hyung-Chan An EPFL July 29, 2013 Joint work with Mohit Singh and Ola Svensson.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
1.3 Modeling with exponentially many constr.  Some strong formulations (or even formulation itself) may involve exponentially many constraints (cutting.
Section 2.9 Maximum Flow Problems Minimum Cost Network Flows Shortest Path Problems.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Great Theoretical Ideas in Computer Science.
Primal-Dual Algorithms for Connected Facility Location Chaitanya SwamyAmit Kumar Cornell University.
LP-Based Algorithms for Capacitated Facility Location Hyung-Chan An EPFL July 29, 2013 Joint work with Mohit Singh and Ola Svensson.
Stochastic Multicast with Network Coding Ajay Gopinathan, Zongpeng Li Department of Computer Science University of Calgary ICDCS 2009, June , Montreal.
First lecture in Mathematics
Models in I.E. Lectures Introduction to Optimization Models: Shortest Paths.
Chap 10. Integer Prog. Formulations
Multicommodity flow, well-linked terminals and routing problems Chandra Chekuri Lucent Bell Labs Joint work with Sanjeev Khanna and Bruce Shepherd Mostly.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 25.
New algorithms for Disjoint Paths and Routing Problems
Lecture.6. Table of Contents Lp –rounding Dual Fitting LP-Duality.
EMIS 8373: Integer Programming Column Generation updated 12 April 2005.
Approximating Buy-at-Bulk and Shallow-Light k-Steiner Trees Mohammad T. Hajiaghayi (CMU) Guy Kortsarz (Rutgers) Mohammad R. Salavatipour (U. Alberta) Presented.
Iterative Rounding in Graph Connectivity Problems Kamal Jain ex- Georgia Techie Microsoft Research Some slides borrowed from Lap Chi Lau.
Prof. Swarat Chaudhuri COMP 382: Reasoning about Algorithms Fall 2015.
Approximation Algorithms Duality My T. UF.
Approximation Algorithms based on linear programming.
1 Maximum Flows CONTENTS Introduction to Maximum Flows (Section 6.1) Introduction to Minimum Cuts (Section 6.1) Applications of Maximum Flows (Section.
Tuesday, March 19 The Network Simplex Method for Solving the Minimum Cost Flow Problem Handouts: Lecture Notes Warning: there is a lot to the network.
New Algorithms for Disjoint Paths Problems Sanjeev Khanna University of Pennsylvania Joint work with Chandra Chekuri Bruce Shepherd.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
EMIS 8373: Integer Programming
Chapter 5. Optimal Matchings
Approximating k-route cuts
1.3 Modeling with exponentially many constr.
James B. Orlin Presented by Tal Kaminker
Network Flow 2016/04/12.
1.3 Modeling with exponentially many constr.
Integer Programming (정수계획법)
Flow Feasibility Problems
Clustering.
Vertex Covers and Matchings
Presentation transcript:

Building Edge-Failure Resilient Networks Chandra Chekuri Bell Labs Anupam Gupta Bell Labs ! CMU Amit Kumar Cornell ! Bell Labs Seffi Naor, Danny Raz Technion Paper in IPCO 2002

Problem Given a “primary” network Want to add a “backup network” s.t. we can route even if an edge fails

Restoration Model Single/Multiple Edge failures Local restoration Cost linear/concave in capacity

Assume: At most one edge fails at any time Commonly used assumption in practice. Ideas/algorithms can be generalized to multiple edge failures Edge Failures

Local Restoration If e = (i,j) with reservation u e fails Backup must be –a single path P(e) between i & j –P(e) has reservation at least u e j i

i j

Multiplexing/Sharing Since only one edge can fail –Different backup paths can share same backup capacity reserved. Cheaper than taking union of P(e)

Why Local Restoration? Quick and oblivious restoration (SONET Rings use local restoration) Single path for simplicity of routing (MPLS) and unsplittable demands.

Cost Model Linear cost function: for edge e, cost c e per unit bandwidth. Reserving capacity costs c e w e Simplest case to understand. In optical networks, capacity essentially unlimited, can buy additional capacity. Algorithms work for concave costs. Hard capacities result in difficult theoretical problems, might not be relevant in practice.

Given: –Graph G = (V,E) –Edge costs c e / unit bandwidth –Primary network A with reservation u e Output: –Build backup network B s.t. for every edge e in A there is path with reservation u e between endpoints of e in B – {e} –Cost =  e c e w e where w e is backup reservation Backup Allocation

Given: –Graph G = (V,E) –Edge costs c e / unit bandwidth –Pair-wise demand matrix D(i,j) Output: –Primary network A to handle D(i,j) & Backup network B s.t. there is path of capacity u e between endpoints of e in B – {e} –Cost =  e c e (u e + w e ) where u e is primary capacity w e is backup capacity Provisioning & Backup

Theorem #1 A constant-factor approximation for the Backup Allocation problem for linear cost model and single edge failures. Theorem #2 Given  approx for provisioning, an O(  log n) approx for P&B. An O(log n) approximation algorithm for Provisioning & Backup. Results

Theorem #3 If primary network is tree T and want T – {e} + P(e) also be tree –As hard as group Steiner problem on trees –If group Steiner tree on trees has an  approximation algorithm, we get an O(  ) approximation. Results (contd.)

Extensions For linear cost model O(k) approximation for k edge failures. For concave costs O(k log u max /u min ) approximation. In terms of n, O(k log n) approximation. Results (contd.)

Related Work Capacitated Survivable Network Design. Hard capacities, emphasis on inequalities to solve exactly. [Bienstock,Muratore], [Balakrishnan, Magnanti, Sokol, Wang]. Many others. Flow restoration instead of path restoration. [Brightwell,Oriolo,Shepherd], [Fleischer et al] Backup allocation for tree networks in VPN hose model [Italiano,Rastogi,Yener]. Our model slightly different from earlier ones. Local restoration instead of end-to-end. Goal – provably good approximation algorithms.

Given: –Graph G = (V,E) –Primary network A with capacities u e –Cost per unit bandwidth on e is c e Output: –Backup network B such that For each edge e = (i,j) 2 A there is path of capacity u e between nodes i and j in B – {e} Objective: minimize cost of B Backup Allocation

All capacities u e = 1 Want to build cheapest network B s.t. For each (i,j) 2 A there is path between i and j in B – {e} Steiner network problem: Want to build cheapest network B s.t. For each (i,j) 2 A there are r ij edge-disjoint paths between i and j in B [Jain 98] 2-approximation algorithm for SN Suppose …

All capacities u e = 1 Algorithm: B 1  SN with r ij = 1 for all e = (i,j) 2 A. For all e = (i,j) 2 A if e 2 B 1 then r’ ij = 2 else r’ ij = 1 Set cost of all edges in B 1 to 0 B 2  SN with demands r’ ij Output B 1 [ B 2 Algorithm (SN1) (SN2)

Feasibility If e  B 1  B 1 – {e} has a path If e 2 B 1  B 2 has two paths  B 2 – {e} has a path Approximation Bound Opt(SN1) · OPT  cost(B 1 ) · 2 OPT OPT [ B 1 is feasible for SN2 (with cost OPT, due to zero costs)  cost(B 2 – B 1 ) · 2 OPT  Approx bound of 4 Correctness

Min  c e w e s.t. w supports unit-flow between i & j in E – {e} for all e = (i,j) 2 A Theorem: The integrality gap of this LP is  An LP formulation

Scaling + previous algorithm Algorithm: A(k) = { e 2 A | 2 k · u e < 2 k+1 } For all e 2 A(k), set u e = 2 k+1 Independently for all k Run previous algorithm on A(k) Assign capacity 2 k+1 on chosen edges B(k) General u e ? 16 approximation solution. Can be improved to 4e  approx. Same algorithm works for concave costs, approximation bound O(log u max /u min )

Min  c e w e s.t. w supports u e -flow between i & j in E – {e} for all e = (i,j) 2 A Theorem: The integrality gap of this LP is  (log n). An LP formulation

Simultaneous Provisioning & Backup

Model? How do we specify demands? Two common models: Point-to-point demand matrix D(u,v)  shortest-path routing optimal VPN upper bounds  constant-factor approximation [Gupta et al 01] Possible other models…

Theorem Given  -approx algorithm for provisioning in some model: we get O(  log n) approx algorithm for backup & provisioning in that model Hence: O(log n)-approx for Point-to-Point, VPN… Results

Algorithm: Use provisioning algorithm to get A (bandwidth allocation = u e ) Use the previous backup algorithm acting on A to get backup network B (bandwidth allocation = w e ) A two-step procedure

Let u* and w* be an optimal solution OPT Claim: u + u* + w* is a feasible solution for the LP Assuming this claim is true: cost(A) ·  cost(u*) ·  OPT LP value · cost(A) + cost(u* + w*) · (  + 1) OPT cost(B) · O(log n) LP · O(  log n) OPT Analysis

Proof Sketch (that u + u* + w* is a valid LP sol’n): If e = (p,q) goes down: “Send back” u e amount of flow using e back to the terminals using e Now since u* + w* forms a edge-failure resilient network: can use this to send “returned” flow in the desired fashion. Analysis (contd.) e p q

Suppose D(r, leaf) = 1 for each leaf Then step #1 can create the blue tree From previous slide: OPT ¸  (d 2 2 d ) But if we chose green star instead Red Star as backup costs d2 d Tightness c e = 1 c e = d

Future Work Improved approximations. Online models. Demand pairs arrive over time. Design primary and backup paths given existing primary and backup networks. Empirical evaluation.