Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.

Slides:



Advertisements
Similar presentations
Chapter 11 Trees Graphs III (Trees, MSTs) Reading: Epp Chp 11.5, 11.6.
Advertisements

Lower Bounds for Local Search by Quantum Arguments Scott Aaronson (UC Berkeley) August 14, 2003.
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
The Capacity of Wireless Networks
Min Cost Flow: Polynomial Algorithms. Overview Recap: Min Cost Flow, Residual Network Potential and Reduced Cost Polynomial Algorithms Approach Capacity.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Single Source Shortest Paths
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
22C:19 Discrete Math Graphs Fall 2014 Sukumar Ghosh.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Bayesian Networks, Winter Yoav Haimovitch & Ariel Raviv 1.
Lecture 24 Coping with NPC and Unsolvable problems. When a problem is unsolvable, that's generally very bad news: it means there is no general algorithm.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Graphs III (Trees, MSTs) (Chp 11.5, 11.6)
Information Networks Small World Networks Lecture 5.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Approximating Maximum Edge Coloring in Multigraphs
Approximation Algorithm for Multicut
Approximation Algorithms: Combinatorial Approaches Lecture 13: March 2.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
CSE 421 Algorithms Richard Anderson Lecture 4. What does it mean for an algorithm to be efficient?
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
Backtracking.
Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, VO. 2, APRIL.
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
The Erdös-Rényi models
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Survivable Logical Topology Design in WDM Optical Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi* The George Washington.
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
Searching via Your Neighbor’s Neighbor: The Power of Lookahead in P2P Networks Moni Naor Udi Wieder The Weizmann Institute of Science Gurmeet Manku Stanford.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
Markov Chains and Random Walks. Def: A stochastic process X={X(t),t ∈ T} is a collection of random variables. If T is a countable set, say T={0,1,2, …
Approximate Inference: Decomposition Methods with Applications to Computer Vision Kyomin Jung ( KAIST ) Joint work with Pushmeet Kohli (Microsoft Research)
Topics in Algorithms 2007 Ramesh Hariharan. Tree Embeddings.
15.082J & 6.855J & ESD.78J September 30, 2010 The Label Correcting Algorithm.
Suppose G = (V, E) is a directed network. Each edge (i,j) in E has an associated ‘length’ c ij (cost, time, distance, …). Determine a path of shortest.
Iterative Improvement for Domain-Specific Problems Lecturer: Jing Liu Homepage:
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Theory of Computational Complexity Yusuke FURUKAWA Iwama Ito lab M1.
Small-world phenomenon: An Algorithmic Perspective Jon Kleinberg.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Peer-to-Peer Networks 07 Degree Optimal Networks
New Characterizations in Turnstile Streams with Applications
Chapter 5. Greedy Algorithms
COMP 6/4030 ALGORITHMS Prim’s Theorem 10/26/2000.
Lecture 18: Uniformity Testing Monotonicity Testing
Lecture 16: Earth-Mover Distance
Bart M. P. Jansen June 3rd 2016, Algorithms for Optimization Problems
Elementary graph algorithms Chapter 22
On the effect of randomness on planted 3-coloring models
Introduction Wireless Ad-Hoc Network
Proof of Kleinberg’s small-world theorems
Chapter 24: Single-Source Shortest Paths
Advanced Algorithms Analysis and Design
Chapter 24: Single-Source Shortest Paths
Elementary graph algorithms Chapter 22
Switching Lemmas and Proof Complexity
Presentation transcript:

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science

Routing in a Faulty Network Node u knows the topology of the graph. Can choose a path to node v. Each link survives independently with probability p. u has partial knowledge on the topology of the graph. How many links (edges) should u probe before a path to v is found (if a path exists). u v G:G: Gp:Gp:

Routing in a Faulty Network Local Router – an algorithm which: Starts at node u. Probes edges which it has reached. Outputs a path to v. Local Routing Complexity of A (with respect to u, v ): The random variable counting the number of probed edges until a path is found (given that a path exists). Interesting when is bounded away from 0. Efficiency: a local algorithm is efficient if its complexity is polynomial in the diameter of the largest component of G p. u v P r [ u » v ]

Routing in a Faulty Network The existence of short paths does not guarantee the ability of finding them. A cycle with a random matching has diameter O ( log n ) [BC88]. Finding a path requires time [Kleinberg00]. On the other hand: The Small World Phenomenon… Our perspective: fault tolerance of networks. Study the effect of random failures on routing. Related to percolation theory – studies the effect of random failures on connectivity. ­ ( n 1 = 2 ) O ( l ogn )

Outline The Hypercube Lower bound: if local routing is not efficient. Tight upper bound: if. For short paths exist but are hard to find. The Mesh Tight upper and lower bounds. Whenever short paths exist (as a function of p ), they can be found. The importance of the locality assumption Local and non local routers may have exponential gap. Another example: tight analysis of G n, p. p << 1 p n p >> 1 p n 1 n < p < 1 p n

The Faulty Hypercube – Some History – The n -dimensional hypercube in which each edge fails independently with probability 1 - p. If then w.h.p. is connected [Burtin77]. Disconnected w.h.p. when. If then w.h.p. H n can emulate H n with constant slowdown [HLN85] (considered node failures). Implicit: local routing in is possible. If then w.h.p contains a giant component [AKS82]. Sharpened by [BKL92],[BSH+04]. Diameter of giant component is. Short paths exist. When all components are of size O ( n ) w.h.p. H p n 1 ¡ p H p n p < 1 2 p > 1 2 p > 1 2 H p n H p n p > ( 1 + ² ) n ¡ 1 H p n po l y ( n ) p < ( 1 ¡ ² ) n ¡ 1

The Faulty Hypercube Question: What probabilities in the range allow local routing (inside the g.c.) with complexity polynomial in n ? Graph is connected. Emulation (and routing) possible No giant component Threshold for constant distortion embedding of H n in [AB03] 1 n < p < n 1 p n p = 1 p = H p n

Local Routing Phase Transition Let 0 < < ½. Lower bound (for ): Any local routing algorithm makes at least queries w.h.p.. Short paths exist but cannot be efficiently found! Upper bound (for ): There exists a local routing algorithm that finds a path between u, v in poly ( n ) time with high probability. 2 ­ ( n ¯ ) p = n ¡ 1 = 2 ¡ ¯ p = n ¡ 1 = 2 + ¯

The Faulty Hypercube Graph is connected. Emulation (and routing) possible No giant compone nt Threshold for constant distortion embedding of H n in [AB03] Local routing in poly ( n ) queries No efficient local routing H p n p = 0 p = 1 1 n 1 p n 1 2

Lemma: Assume V. Denote: -– v is connected to u inside S. Q – the number of queries of a local router from u to v. For each e crossing the cut. The Lower Bound Lemma V = S [ ¹ S, v 2 S S ¹ S vu e f ( u S » v ) g ( S ; ¹ S ), P r [( v S » e )] < ³ 8 t P r [ Q < t ] · t ³ + P r [( u S » v )]

The Lower Bound Lemma – Simple Example Lemma: Assume V. Denote: -– v is connected to u inside S. Q – the number of queries of a local router from u to v. For each e crossing the cut. Double Tree (0< p <1): S = the bottom tree,. Lemma implies: for, V = S [ ¹ S, v 2 S v u S ³ = p n f ( u S » v ) g ( S ; ¹ S ), P r [( v S » e )] < ³ 8 t P r [ Q < t ] · t ³ + P r [( u S » v )] t = ² 1 p n P r [ Q < t ] · t p n = ²

The Double Tree – u, v are connected Double Binary Tree – 2 depth n trees joined at their leaves. A path u ~ v exists iff there is a leaf w and mirroring paths. The event { u ~v}is tantamount to a branching process with p 2. Path exists with constant probability, when p is a constant >. u v u » v u » w ; v » w f u » v g 1 p 2

Lower Bound Lemma proof – Relaxed Model If, the algorithm stops successfully (complexity = 0). When a cut edge is probed, its entire component in S is given to the algorithm for free. If this component contains v the algorithm stops successfully. S ¹ S v ( u S » v )

Assume: For each probed edge e i entering S : Lower Bound Lemma - Proof u v C 0 C 1 C 2 C i u 2 S P r [( e i » v ) 2 S j C 0 ;:::; C i ¡ 1 ] · ³ · t ³ S ¹ S P r [ Q < t ] · P r [ Q < t j ( u S ¿ v )] + P r [( u S » v )]

Hyper Cube - Lower Bound Fix: (almost surely ). For any two vertices u, v, any local routing algorithm (almost surely) makes at least queries to find a path between u, v. p = n ¡ 1 = 2 ¡ ¯ ( u » v ) n ¡ ­ ( n ¯ = 2 )

Fix: (almost surely ). Claim: #of paths s of length is at most. s Applying the Lemma to the Hypercube ( v » x ) 2 S ` + 2 k n k ` 2 k `! p = n ¡ 1 = 2 ¡ ¯ ( u » v ) v x y e ¹ S S ` = n ¯ = 2 8 e 2 S £ ¹ S : P r [( v S » e )] < ³ ) P r [ Q < t ] · t ³ + P r [( u S » v )] · 2 n ¡ ­ ( n ¯ = 2 ) ³ = P r [( v S » x )] · 1 X k = 0 p l + 2 k n k l 2 k l!

Lemma: #of paths s inside S of length is at most. s Proof: Let A k be the set of such paths of length. A 0 = l ! There exists a mapping between A k and A k -1 that maps at most A k -paths into one A k -1 -path. A path is a list of coordinate changes: n possible coordinates and possible indices in the path. Applying the Lemma to the Hypercube ` + 2 k n k ` 2 k `! j A k j · n ` 2 j A k ¡ 1 j = ) j A k j · n k ` 2 k `! ` + 2 k ` + 1 A 0 = `! n ¢ ` 2 ¡ ` ¢ ( v » x )

Fix: (almost surely ). Claim: #of paths s of length is at most. s Applying the Lemma to the Hypercube ( v » x ) 2 S ` + 2 k n k ` 2 k `! p = n ¡ 1 = 2 ¡ ¯ ( u » v ) v x y e ¹ S S ` = n ¯ = 2 ³ = P r [( v » x ) 2 S ] · 1 X k = 0 p l + 2 k n k l 2 k l! 8 e 2 S £ ¹ S : P r [( v S » e )] < ³ · 2 n ¡ ­ ( n ¯ = 2 ) = o ( 1 ) ) P r [ Q < t ] · t ³ + P r [( u S » v )]

Claim: for any vertex of distance m from v : Proof sketch: #paths inside S of length m +2 k is at most. n k ` 2 k m ! v u S ` = n ¯ = 2 [ = n ¡ m ¯ = 2 ] u 2 S P r [( u S » v )] = o ( 1 ) ( v » u ) P r [( u S » v )] · 1 X k = 0 p m + 2 k n k l 2 k m ! = o ( 1 )

Hyper Cube So far we have shown: if, then #queries made by any local algorithm is exponential. We will now show: a local algorithm which (almost surely) makes only poly( n ) queries for. p << 1 p n p >> 1 p n

The Hypercube – Efficient Algorithm for We observe that the embedding of [AB03]: For any adjacent u, v in H n : with probability u, v are mapped to themselves and their distance in is at most. The Algorithm: Fix a shortest path in H n :. With high probability all nodes are mapped to themselves. Any two adjacent vertices in the above path are at distance from each other in. Exhaustively search balls around x i until x i + 1 is found. Requires at most probes. The algorithm does not know the embedding. p = n ¡ 1 = 2 + ¯ ` = ` ( ¯ ) u = x 0 ; x 1 ;:::; x k = v ` n ` 1 ¡ e ¡ ­ ( p n ) H p n H p n

The Mesh M d We will show: An efficient local algorithm for the mesh.

The Infinite Mesh M d M - Each edge fails with probability. For each dimension d there exists such that: If then contains one infinite component with prob. If then with prob. all components of are finite. The value of is not always known:. and decreasing. For finite meshes: translates to high probability bounds on the existence of giant components. M d p 1 ¡ p 1 1 p c p d c M d p p < p d c p > p d c M d p p 2 c = 1 2 p d c = ( 1 + o ( 1 )) 1 2 d

Routing in the Faulty Mesh Theorem: let u, v be two vertices at distance k in M d. Assuming, there exists a routing algorithm which finds a path using O ( k ) probes in expectation. The Algorithm – similar to the hypercube algorithm: Fix a shortest path –. Once in x i – exhaustively search inside increasing balls around x i until x j ( j>i ) is found. Assuming the algorithm will output a path. u » v u » vu = x 0 ; x 1 ;:::; x k = v

Proof Outline x 1 x i + 1 ¿ x k = v P r [ ¿ > a ] < e ¡ ca x i 1 X a = 1 ( 2 a ) d e ¡ ca = O ( 1 ) u = x 0 Claim: Let x i be a vertex in the shortest path. Its potential contribution is expected to be O(1). Show:

Let x i be a vertex in the shortest path and in the giant component: [AP96] The next vertex in g.c. is not likely to be far: Let d, D be the metrics before and after the percolation. [AP96]: There is such that for any : Proof – Bounding : x i x i + 1 a > ½ ¢ d ( x ; y ) u = x 0 x k = v l x i + l + 1 P r [ l > a ] < e ¡ ­ ( a ) P r [( D ( x ; y ) > a ) ^ ( x » y )] < e ¡ ­ ( a )

Local Routing vs. Oracle Rounting Oracle Routing: The algorithm may probe any edge of the graph (even edges it did not reach). Oracle Routing adds power: there are graphs in which there is a noticeable gap between Oracle and Local Routing complexities. Double binary tree – exponential gap. - polynomial gap. G n ; c = n

Double Binary Tree Find a mirror path by querying simultaneously from both sides (using DFS). Equivalent to finding a path from a root to a leaf in a super-critical tree. Bad branches are expected to have constant size. u v p 2 > 1 2

G n, c / n Lower Bound for Local Routing Lower bound: Any local algorithm almost surely needs ( n 2 / c 2 ) queries. Proof Sketch: After k queries the algorithm reveals roughly kp vertices. Any new revealed vertex has probability p to be connected to v. total probability of connection to v after k queries is kp 2 (=o(1) for k = o( n 2 / c 2 ) ).

G n, c / n Oracle Routing using O( n 3/2 ) queries Grow a ( n 1/2 ) size component around each of u, v. Roughly n 3/2 / c queries are needed. Almost surely there is an edge between C u, C v (and only O( n ) queries are needed to find it). Remark: the above algorithm is optimal up to constant factors. C u C v u v

Summary connectivity Efficient oracle routing Efficient local routing Gap: double binary tree p 2 > ½. Gap: in G n, p for p = c / n. Oracle router needs O( n 3/2 ) queries but diameter is poly(log n ). Gap: Hyper-cube 1/ n < p < n -1/2