cs/ee/ids 143 Communication Networks

Size: px
Start display at page:

Download "cs/ee/ids 143 Communication Networks"

Transcription

1 cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech

2 Warning These notes are not self-contained, probably not understandable, unless you also were in the lecture They are supplement to not replacement for class attendance

3 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding

4 Putting it all together Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected

5 What is routing? Choose red or blue? Internet A B

6 How to route? Two layers of routing: 1. Choose which AS? - BGP 2. How to route inside an AS? - OSPF A Internet Autonomy system (AS) e.g., AT&T, Verizon, MIT. B

7 Why two layers? o Different objectives n Choose AS: special policies n Inside AS: minimize delay, # hops o Simplify routing n Choose AS: ignore details inside AS n Inside AS: only details inside AS

8 Inter-domain routing: BGP Peering relation: A-B, B-C A, B, C carry each other s traffic free of charge B only advertises B to A and to C A does not know how to reach C through this. A must have transit relation with anther ISP (not shown here) that carries its traffic to C. Transit relation: A-B, B-C Customer-provider relation, e.g., B is provider for A and for C. A (C) pays B for carrying to/from A (C). B advertises {B,C} to A and {A, B} to C so that all ISP s know how to reach all destinations.

9 Inter-domain routing: BGP A typical configuration

10 Inter-domain routing: BGP BGP is policy-based routing o Generally not shortest-path o Other factors are generally more important in determining an AS-path than performance n Peering agreement n Pricing (revenue/cost) with next hop n Reliability, security, political reasons o Can lead to oscillation and bad performance

11 Inter-domain routing: BGP Example BGP policy at Berkeley: 1. If possible, avoid AT&T 2. Choose path with smallest #hops 3. Alphabetical Berkeley decision: use path Sprint-Verizon-MIT to reach MIT

12 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, NA) (MIT, NA)

13 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Berkeley policy: avoid AT&T if possible Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, Sprint---Verizon---MIT) (MIT, Berkeley---AT&T---MIT) (MIT, Verizon---AT&T---MIT) (MIT, AT&T---Verizon---MIT) (MIT, Sprint---AT&T---MIT)

14 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Berkeley policy: avoid AT&T if possible Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, Sprint---Verizon---MIT) (MIT, Berkeley---AT&T---MIT) (MIT, Berkeley---Sprint---Verizon---MIT)

15 Border Gateway Protocol (BGP) In BGP, each AS o Announces itself to other ASes and which ASes it can reach o Obtains ASes reachability info from neighboring ASes o Propagate reachability info to all routers internal to the AS o Determine good routes to ASes based on reachability info and AS policy

16 BGP: potential oscillation Example BGP policy to reach D: 1. Prefer 2-hop path to 1-hop 2. Avoid 3-hop paths Oscillation: Every node will alternate between choosing an 1-hop path and 2-hop path

17 Some questions Q1: Why not 3-level, or N-level, routing? Q2: How can a source ensure that its packets follow the inter-domain path it wants? Q3: In BGP, can one prevent a domain from lying and funneling all traffic through itself in order eavesdrop?

18 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding

19 Shortest-path algorithm Input: graph G = ( V, E), link costs d ij ( d ij = if ( i, j) E) Execution: algorithm run at each node Output: n n Dijkstra: shortest-path tree rooted at the node Bellman-Ford: next hop to all destinations from the node (entries in forwarding table) Notation: n D x (i) : min cost to reach node i from x n pred x (i) : parent node of i (for Dijkstra) n next x (i) : next hop to i from x (for Bellman-Ford)

20 Init: Dijkstra algorithm Each node x sends d xi to all other nodes i while { D i * = R for all do { if ( j) > D ( i * ) + d then }for }while ( i) = d, D ( x) = 0, R { x}, x xi x = R V argmin R { i R }if D x ( i) j N( i * ) \ x { i * } x R D * D ( j) D ( i ) d * x pred(j) = x * i i j * + i pred x (i) = null Run at each source node x j Which step requires non-local info?

21 Init: Dijkstra algorithm Each node x sends d xi to all other nodes i while { D i * = R for all do { if ( j) > D ( i * ) + d then }for }while ( i) = d, D ( x) = 0, R { x}, x xi x = R V argmin R { i R }if D x ( i) j N( i * ) \ x { i * } x R D * D ( j) D ( i ) d * x pred(j) = x * i i j * + i pred x (i) = null Run at each source node x j Which step requires non-local info?

22 Dijkstra algorithm B A F C E D P(1) 1 B A F C E D P(2) 1 B A F C E D P(3) 1 2 B A F C E D P(4) B A F C E D P(5) B A F C E D P(6): Final

23 Init: Bellman-Ford algorithm D ( i) = d, D ( x) = 0, R { x}, x xi x = Each node x sends distance vector neighbors whenever ( i), i V pred x (i) = null ( D x ( i), i V ) ( ) changes D x to all its do (execute when link cost changes or on receipt of a DV from neighbor) { } for all destination nodes i { }for until no change D x (i) := min next x (i) = j N (x) ( d xj + D j (i)) j * := argmin j N (i) ( d xj + D j (i)) Run at each source node x

24 Bellman-Ford algorithm A 1 4 B 1 1 F 3 1 C E D Consider the calculations at all nodes to reach node D Every node has access to distance estimates from neighbors to D Assume synchronous operation P(1) iteration D A (D) next A (D) D B (D) next B (D) D C (D) next C (D) D E (D) next E (D) D F (D) next F (D) 0 Inf - Inf - 2 D 4 D Inf - 1 Inf - 5 C 2 D 3 C 5 E 2 6 B 4 E 2 D 3 C 4 E 3 5 B 4 E 2 D 3 C 4 E 4 5 B 4 E 2 D 3 C 4 E

25 Compare Dijsktra & BF o Message exchange n n Dijkstra: every node sends only its incident link costs to all other nodes. This requires O( V E ) messages. BF: every node sends only to its neighbors least-cost estimates from itself to all other nodes o Speed of convergence n n Disjstra: above implementation takes O( V 2 ); can be reduced using heap BF: can converge slowly and have routing loops during transient; count-to-infinity problem (can be solved using poisoned reverse) o No clear winner n n n Both are used on Internet RIP: distance-vector protocol OSPF: link-state protocol (meant to be successor to RIP)

26 Count-to-infinity problem Example Link between B & C fails A and B will not realize it, a routing update is created and their cost estimate to C keeps going up A solution: poisoned reverse: instead of telling B its true cost (2) to reach C, A tells B that its cost to reach C is infinity because A uses B to reach C.

27 Compare Dijsktra & BF o Dijkstra algorithm n Needs global information (link-state alg) n Each node broadcasts link-state packets to all other nodes in network n Each node executes Dijkstra alg to calculate shortest paths to all other nodes n After k iteration, shortest paths to k destinations are known (and they are the k shortest paths among the shortest paths to all nodes) n Terminates after N-1 iterations (N = #nodes)

28 Compare Dijsktra & BF o Bellman-Ford algorithm n Only needs local information (distance-vector alg) n Each node exchanges with neighbors the vector of distances from itself to all other nodes n Each node then updates the next hop and associated distance to all other nodes using Bellman-Ford (DP) equation n Decentralized, asynchronous, distributed

29 Other questions o How can routers trust each other? o How to deal with non-convergence in DV protocol? How often is oscillation encountered in practice? o Router R1 can route a pkt to host A through R2 or R3; R2 can route through R4 or R5 and has chosen R4. But R1 prefers R5 to R2 to R4. What happens?

30 Other questions o What is timescale for routing update? o What are major impediments to making significant changes to routing architecture? Would a bio-inspired routing system feasible? o Can network coding & FEC be combined?

31 Putting it all together Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected

32 Putting it all together Thenetworkaddressesofnodesaregivenby<AS>.<Network>.0.<node>, e.g., node A has the address AS1.E1.0.A, The bridge IDs satisfy B1 < B2 < B3, HisnotconnectedtoAS2.E5forpart(a), TheBGPSpeakersusetheleast-next-hop-costpolicyforrouting(i.e.,amongalternative paths to the destination AS, choose the one that has the least cost on the first hop), and The network topology shown has been stable for a long enough time to allow all the routing algorithms to converge and all the bridges to learn where to forward each packet. Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

33 Putting it all together 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? later goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected

34 1. compute spanning tree Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

35 2. compute intra-as routing Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

36 3. compute inter-as routing 1. How to route G à A? Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

37 3. compute inter-as routing 1. How to route G à A? Does A à G follow the same path? Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

38 4. Address resolution protocol 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected

39 4. Address resolution protocol Packets from D can be delivered to subnet AS2.B1 based on IP address of H AS2.B1 does not know H AS2.B1 uses ARP to find H s MAC address Use STP to forward pkts to H Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected

40 Example: H1 wants to send packet to H2 Network Link [all, gateway e1, who is IP2?] Ethernet switch Link layer on H1 broadcasts a message (ARP query) on its layer 2 network asking for the MAC address corresponding to IP2

41 Example: H1 wants to send packet to H2 Network Link [all, gateway e1, who is IP2?] Ethernet switch Network Link [e1, e2, I am IP2] Link layer on H2 responds to the ARP query with its MAC address

42 Example: H1 wants to send packet to H2 Network Link [e2, gateway e1,[ip1, IP2, X]] Ethernet switch Network Link Once the link layer on H1 knows e2, it can now send the original message

43 Example: H1 wants to send packet to H2 Network Link [e2, gateway e1,[ip1, IP2, X]] Ethernet switch Network Link [IP1, IP2, X] [e2, e1,[ip1, IP2, X]] Link layer on H2 delivers the packet to the network layer on H2

44 5. re-compute routing table 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

45 5. re-compute routing tables Failure detected by AS2.R1 and AS2.R3; update routing tables (intra-as) Failure detected by border gateway in AS5 BGP re-computes The path between AS2 and AS5 will be changed goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010]

46 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding

47 FEC: packet erasure code Recover from packet loss Coding n Input: n packets n Output: m packets o C k P 1,, P n C 1,,C m, m > n { } = bit-by-bit XOR of a random subset of C k := P i1 P i2 P ij k P 1,, P n o Header of C k specifies the subset used to generate C k

48 FEC: packet erasure code Decoding n If C j = P i for some i, then C k := C k P i for all pkts C k that contains P i n Remove C j from the collection of rec d pkts n Repeat until all P 1,, P n have been decoded n If at one step, there is no C j { P 1,, P n } then decoding fails

49 FEC: example P1 P2 P3 P4 C1 C2 C3 C4 C5 C6 C7 Decoding: received pkts C = { C 1,C 3,C 5,C 6 } C = { C 1,C 3,C 5,C 6 } P = { } : received pkt C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }

50 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 1,C 3,C 5,C 6 } P = { } C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }

51 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 1,C 3,C 5,C 6 } P = { } C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }

52 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3

53 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3

54 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3

55 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 6 } P { P 1, P 3, P } 4

56 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 6 } P { P 1, P 3, P } 4

57 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 3 } P { P 1, P 3, P } 4

58 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3 } P = { P 1, P 2, P 4 } C 3 = P 3 C = { } P { P 1, P 2, P 3, P 4 }

59 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3 } P = { P 1, P 2, P 4 } C 3 = P 3 C = { } P { P 1, P 2, P 3, P 4 }

60 Network coding: example link rate = R on every link multicast to both Y & Z T Y S b 1 b 2 b 1 b 2 W X U b 1 b b 1 2 b 21 b 1 Z throughput = 1.5R T b 1 b 1 b 2 Y S b 1 b 2 b 1 b 2 W X b 1 b 2 b 1 b 2 U Z throughput = 2R b 2

61 Network coding: example X and Y want to exchange A & B (1) (2) A B X Z Y A B (3) A B Without network coding, needs 4 pkt xmissions With network coding, needs 3 pkt xmissions

Chapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 6 Dynamic Programming Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 6.8 Shortest Paths Shortest Paths Shortest path problem. Given a directed graph G = (V,

More information

6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph

6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph 6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph Shortest paths Shortest path problem. Given a digraph G = (V, E),

More information

Routing. Topics: 6.976/ESD.937 1

Routing. Topics: 6.976/ESD.937 1 Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution

More information

What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol?

What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? Timothy G. Griffin Computer Laboratory University of Cambridge, UK timothy.griffin@cl.cam.ac.uk Advanced Networks

More information

6. DYNAMIC PROGRAMMING II

6. DYNAMIC PROGRAMMING II 6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford algorithm distance vector protocols negative cycles in a digraph Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison

More information

Data Structures and Algorithms CMPSC 465

Data Structures and Algorithms CMPSC 465 ata Structures and Algorithms MPS LTUR ellman-ford Shortest Paths Algorithm etecting Negative ost ycles Adam Smith // A. Smith; based on slides by K. Wayne,. Leiserson,. emaine L. Negative Weight dges

More information

An algebraic framework for a unified view of route-vector protocols

An algebraic framework for a unified view of route-vector protocols An algebraic framework for a unified view of route-vector protocols João Luís Sobrinho Instituto Superior Técnico, Universidade de Lisboa Instituto de Telecomunicações Portugal 1 Outline 1. ontext for

More information

Active Measurement for Multiple Link Failures Diagnosis in IP Networks

Active Measurement for Multiple Link Failures Diagnosis in IP Networks Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks

More information

CS 4407 Algorithms Lecture: Shortest Path Algorithms

CS 4407 Algorithms Lecture: Shortest Path Algorithms CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed

More information

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)

More information

7600 Series Routers Adjacency Allocation Method

7600 Series Routers Adjacency Allocation Method 7600 Series Routers Adjacency Allocation Method Document ID: 118393 Contributed by Amit Goyal and Ruchir Jain, Cisco TAC Engineers. Nov 06, 2014 Contents Introduction Background Information Adjacency Entry

More information

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Joan Feigenbaum Yale Scott Shenker ICSI Slides: http://www.cs.yale.edu/~jf/dialm02.{ppt,pdf} Paper: http://www.cs.yale.edu/~jf/fs.{ps,pdf}

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Private and Verifiable Interdomain Routing Decisions. Proofs of Correctness

Private and Verifiable Interdomain Routing Decisions. Proofs of Correctness Technical Report MS-CIS-12-10 Private and Verifiable Interdomain Routing Decisions Proofs of Correctness Mingchen Zhao University of Pennsylvania Andreas Haeberlen University of Pennsylvania Wenchao Zhou

More information

Slides for Chapter 14: Time and Global States

Slides for Chapter 14: Time and Global States Slides for Chapter 14: Time and Global States From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Clocks,

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

Time. Today. l Physical clocks l Logical clocks

Time. Today. l Physical clocks l Logical clocks Time Today l Physical clocks l Logical clocks Events, process states and clocks " A distributed system a collection P of N singlethreaded processes without shared memory Each process p i has a state s

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 21 Single-Source Shortest Paths Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 Single-Source

More information

Theoretical Computer Science. Partially dynamic efficient algorithms for distributed shortest paths

Theoretical Computer Science. Partially dynamic efficient algorithms for distributed shortest paths Theoretical Computer Science 411 (2010) 1013 1037 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Partially dynamic efficient algorithms

More information

Decision making, Markov decision processes

Decision making, Markov decision processes Decision making, Markov decision processes Solved tasks Collected by: Jiří Kléma, klema@fel.cvut.cz Spring 2017 The main goal: The text presents solved tasks to support labs in the A4B33ZUI course. 1 Simple

More information

In the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich

In the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich The Power of a Leader In the Stone Age - MIT Yuval Emek - Technion Roger Wattenhofer - ETH Zürich 2nd Workshop on Biological Distributed Algorithms, October 11-12, 2014 in Austin, Texas USA The Power of

More information

Fault-Tolerant Consensus

Fault-Tolerant Consensus Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process

More information

Clocks in Asynchronous Systems

Clocks in Asynchronous Systems Clocks in Asynchronous Systems The Internet Network Time Protocol (NTP) 8 Goals provide the ability to externally synchronize clients across internet to UTC provide reliable service tolerating lengthy

More information

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11 Undirected Graphs Undirected graph. G = (V, E) V = nodes. E = edges between pairs of nodes. Captures pairwise relationship between objects. Graph size parameters: n = V, m = E. V = {, 2, 3,,,, 7, 8 } E

More information

6.852: Distributed Algorithms Fall, Class 10

6.852: Distributed Algorithms Fall, Class 10 6.852: Distributed Algorithms Fall, 2009 Class 10 Today s plan Simulating synchronous algorithms in asynchronous networks Synchronizers Lower bound for global synchronization Reading: Chapter 16 Next:

More information

Internet Topology Characterization on AS Level

Internet Topology Characterization on AS Level Internet Topology Characterization on AS Level SARA ANISSEH Master s Degree Project Stockholm, Sweden XR-EE-LCN 2012:013 KTH Electrical Engineering THE INTERNET TOPOLOGY CHARACTERIZATION ON AS LEVEL SARA

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths

Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Matroids Shortest Paths Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Marc Uetz University of Twente m.uetz@utwente.nl Lecture 2: sheet 1 / 25 Marc Uetz Discrete Optimization Matroids

More information

Clock Synchronization

Clock Synchronization Today: Canonical Problems in Distributed Systems Time ordering and clock synchronization Leader election Mutual exclusion Distributed transactions Deadlock detection Lecture 11, page 7 Clock Synchronization

More information

Distributed Systems Fundamentals

Distributed Systems Fundamentals February 17, 2000 ECS 251 Winter 2000 Page 1 Distributed Systems Fundamentals 1. Distributed system? a. What is it? b. Why use it? 2. System Architectures a. minicomputer mode b. workstation model c. processor

More information

Distributed Systems Gossip Algorithms

Distributed Systems Gossip Algorithms Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information

More information

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes Analysis of Algorithms Single Source Shortest Path Andres Mendez-Vazquez November 9, 01 1 / 108 Outline 1 Introduction Introduction and Similar Problems General Results Optimal Substructure Properties

More information

L11: Algebraic Path Problems with applications to Internet Routing Lectures 7 and 8

L11: Algebraic Path Problems with applications to Internet Routing Lectures 7 and 8 L: Algebraic Path Problems with applications to Internet Routing Lectures 7 and 8 Timothy G. Grifn timothy.grifn@cl.cam.ac.uk Computer Laboratory University of Cambridge, UK Michaelmas Term, 27 tgg22 (cl.cam.ac.uk)

More information

Steps towards Decentralized Deterministic Network Coding

Steps towards Decentralized Deterministic Network Coding Steps towards Decentralized Deterministic Network Coding BY Oana Graur o.graur@jacobs-university.de Ph.D. Proposal in Electrical Engineering Ph.D Proposal Committee: Prof. Dr.-Ing. Werner Henkel, Dr. Mathias

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths

More information

Linear Programming Duality

Linear Programming Duality Summer 2011 Optimization I Lecture 8 1 Duality recap Linear Programming Duality We motivated the dual of a linear program by thinking about the best possible lower bound on the optimal value we can achieve

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

Discrete Wiskunde II. Lecture 5: Shortest Paths & Spanning Trees

Discrete Wiskunde II. Lecture 5: Shortest Paths & Spanning Trees , 2009 Lecture 5: Shortest Paths & Spanning Trees University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Shortest Path Problem "#$%&'%()*%"()$#+,&- Given directed "#$%&'()*+,%+('-*.#/'01234564'.*,'7+"-%/8',&'5"4'84%#3

More information

Shortest Path Algorithms

Shortest Path Algorithms Shortest Path Algorithms Andreas Klappenecker [based on slides by Prof. Welch] 1 Single Source Shortest Path 2 Single Source Shortest Path Given: a directed or undirected graph G = (V,E) a source node

More information

Discrete Optimization 2010 Lecture 3 Maximum Flows

Discrete Optimization 2010 Lecture 3 Maximum Flows Remainder: Shortest Paths Maximum Flows Discrete Optimization 2010 Lecture 3 Maximum Flows Marc Uetz University of Twente m.uetz@utwente.nl Lecture 3: sheet 1 / 29 Marc Uetz Discrete Optimization Outline

More information

Single Source Shortest Paths

Single Source Shortest Paths CMPS 00 Fall 017 Single Source Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight

More information

6.867 Machine learning, lecture 23 (Jaakkola)

6.867 Machine learning, lecture 23 (Jaakkola) Lecture topics: Markov Random Fields Probabilistic inference Markov Random Fields We will briefly go over undirected graphical models or Markov Random Fields (MRFs) as they will be needed in the context

More information

FlowSpec. Frédéric Gabut-Deloraine. FRnOG - 2 décembre 2011 NEO TELECOMS

FlowSpec. Frédéric Gabut-Deloraine. FRnOG - 2 décembre 2011 NEO TELECOMS FlowSpec Frédéric Gabut-Deloraine NEO TELECOMS FRnOG - 2 décembre 2011 Introduction Dissemination of Flow Specification Rules D(D)oS filtering Regular use Easy to disseminate Agenda Background Forwarding

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Fall 205 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 7 October 22, 205 Chandra & Manoj (UIUC) CS374 Fall 205 / 54 Part I Shortest Paths with

More information

Problem set 1. (c) Is the Ford-Fulkerson algorithm guaranteed to produce an acyclic maximum flow?

Problem set 1. (c) Is the Ford-Fulkerson algorithm guaranteed to produce an acyclic maximum flow? CS261, Winter 2017. Instructor: Ashish Goel. Problem set 1 Electronic submission to Gradescope due 11:59pm Thursday 2/2. Form a group of 2-3 students that is, submit one homework with all of your names.

More information

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson Distributed systems Lecture 4: Clock synchronisation; logical clocks Dr Robert N. M. Watson 1 Last time Started to look at time in distributed systems Coordinating actions between processes Physical clocks

More information

Week 4. (1) 0 f ij u ij.

Week 4. (1) 0 f ij u ij. Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known

More information

Our Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering

Our Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering Our Problem Global Predicate Detection and Event Ordering To compute predicates over the state of a distributed application Model Clock Synchronization Message passing No failures Two possible timing assumptions:

More information

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007 Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can

More information

Decentralized Detection In Wireless Sensor Networks

Decentralized Detection In Wireless Sensor Networks Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation

More information

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,

More information

Shortest Paths & Link Weight Structure in Networks

Shortest Paths & Link Weight Structure in Networks Shortest Paths & Link Weight Structure in etworks Piet Van Mieghem CAIDA WIT (May 2006) P. Van Mieghem 1 Outline Introduction The Art of Modeling Conclusions P. Van Mieghem 2 Telecommunication: e2e A ETWORK

More information

Agreement. Today. l Coordination and agreement in group communication. l Consensus

Agreement. Today. l Coordination and agreement in group communication. l Consensus Agreement Today l Coordination and agreement in group communication l Consensus Events and process states " A distributed system a collection P of N singlethreaded processes w/o shared memory Each process

More information

Maximizable Routing Metrics

Maximizable Routing Metrics Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources

More information

6.852: Distributed Algorithms Fall, Class 24

6.852: Distributed Algorithms Fall, Class 24 6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Foundational Theory for Understanding Policy Routing Dynamics

Foundational Theory for Understanding Policy Routing Dynamics Foundational Theory for Understanding Policy Routing Dynamics Karim Mattar Samuel Epstein Ibrahim Matta Computer Science, Boston University Email: {kmattar, samepst, matta}@cs.bu.edu Technical Report BUCS-TR-9-

More information

SFM-11:CONNECT Summer School, Bertinoro, June 2011

SFM-11:CONNECT Summer School, Bertinoro, June 2011 SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision

More information

Lecture 11. Single-Source Shortest Paths All-Pairs Shortest Paths

Lecture 11. Single-Source Shortest Paths All-Pairs Shortest Paths Lecture. Single-Source Shortest Paths All-Pairs Shortest Paths T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to, rd Edition, MIT Press, 009 Sungkyunkwan University Hyunseung Choo choo@skku.edu

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

The Bloom Paradox: When not to Use a Bloom Filter

The Bloom Paradox: When not to Use a Bloom Filter 1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and

More information

Part V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows

Part V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows Matching Input: undirected graph G = (V, E). M E is a matching if each node appears in at most one Part V edge in M. Maximum Matching: find a matching of maximum cardinality Matchings Ernst Mayr, Harald

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

CMPS 6610 Fall 2018 Shortest Paths Carola Wenk

CMPS 6610 Fall 2018 Shortest Paths Carola Wenk CMPS 6610 Fall 018 Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight function w

More information

Dijkstra s Single Source Shortest Path Algorithm. Andreas Klappenecker

Dijkstra s Single Source Shortest Path Algorithm. Andreas Klappenecker Dijkstra s Single Source Shortest Path Algorithm Andreas Klappenecker Single Source Shortest Path Given: a directed or undirected graph G = (V,E) a source node s in V a weight function w: E -> R. Goal:

More information

The Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing

The Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing ROMA TRE UNIVERSITÀ DEGLI STUDI Roma Tre University Ph.D. in Computer Science and Engineering The Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing Marco Chiesa The Role

More information

Reliable Broadcast for Broadcast Busses

Reliable Broadcast for Broadcast Busses Reliable Broadcast for Broadcast Busses Ozalp Babaoglu and Rogerio Drummond. Streets of Byzantium: Network Architectures for Reliable Broadcast. IEEE Transactions on Software Engineering SE- 11(6):546-554,

More information

Lecture 7: Shortest Paths in Graphs with Negative Arc Lengths. Reading: AM&O Chapter 5

Lecture 7: Shortest Paths in Graphs with Negative Arc Lengths. Reading: AM&O Chapter 5 Lecture 7: Shortest Paths in Graphs with Negative Arc Lengths Reading: AM&O Chapter Label Correcting Methods Assume the network G is allowed to have negative arc lengths but no directed negativelyweighted

More information

Network Design Problems Notation and Illustrations

Network Design Problems Notation and Illustrations B CHAPTER 2 Network Design Problems Notation and Illustrations In Chapter 1, we have presented basic ideas about communication and computer network design problems that a network provider is likely to

More information

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing 1 Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista Massimo Rimondini Stefano Vissicchio Dept. of Computer Science and Automation,

More information

VLSI Signal Processing

VLSI Signal Processing VLSI Signal Processing Lecture 1 Pipelining & Retiming ADSP Lecture1 - Pipelining & Retiming (cwliu@twins.ee.nctu.edu.tw) 1-1 Introduction DSP System Real time requirement Data driven synchronized by data

More information

Asynchronous Convergence of Policy-Rich Distributed Bellman-Ford Routing Protocols

Asynchronous Convergence of Policy-Rich Distributed Bellman-Ford Routing Protocols Asynchronous Convergence of Policy-Rich Distributed Bellman-Ford Routing Protocols SIGCOMM 2018 Matthew Daggitt 1 Alexander Gurney 2 Timothy Grin 1 21st of August 2018 1 University of Cambridge 2 Comcast

More information

Lecture 2: Divide and conquer and Dynamic programming

Lecture 2: Divide and conquer and Dynamic programming Chapter 2 Lecture 2: Divide and conquer and Dynamic programming 2.1 Divide and Conquer Idea: - divide the problem into subproblems in linear time - solve subproblems recursively - combine the results in

More information

Time. To do. q Physical clocks q Logical clocks

Time. To do. q Physical clocks q Logical clocks Time To do q Physical clocks q Logical clocks Events, process states and clocks A distributed system A collection P of N single-threaded processes (p i, i = 1,, N) without shared memory The processes in

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications: AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)

More information

Maximum flow problem (part I)

Maximum flow problem (part I) Maximum flow problem (part I) Combinatorial Optimization Giovanni Righini Università degli Studi di Milano Definitions A flow network is a digraph D = (N,A) with two particular nodes s and t acting as

More information

Asymptotics, asynchrony, and asymmetry in distributed consensus

Asymptotics, asynchrony, and asymmetry in distributed consensus DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,

More information

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours. UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next

More information

Distributed Consensus

Distributed Consensus Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

Asynchronous Models For Consensus

Asynchronous Models For Consensus Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms

More information

Eventually consistent failure detectors

Eventually consistent failure detectors J. Parallel Distrib. Comput. 65 (2005) 361 373 www.elsevier.com/locate/jpdc Eventually consistent failure detectors Mikel Larrea a,, Antonio Fernández b, Sergio Arévalo b a Departamento de Arquitectura

More information

Lecture 14 October 22

Lecture 14 October 22 EE 2: Coding for Digital Communication & Beyond Fall 203 Lecture 4 October 22 Lecturer: Prof. Anant Sahai Scribe: Jingyan Wang This lecture covers: LT Code Ideal Soliton Distribution 4. Introduction So

More information

CS505: Distributed Systems

CS505: Distributed Systems Department of Computer Science CS505: Distributed Systems Lecture 5: Time in Distributed Systems Overview Time and Synchronization Logical Clocks Vector Clocks Distributed Systems Asynchronous systems:

More information

Distributed Algorithms

Distributed Algorithms Distributed Algorithms December 17, 2008 Gerard Tel Introduction to Distributed Algorithms (2 nd edition) Cambridge University Press, 2000 Set-Up of the Course 13 lectures: Wan Fokkink room U342 email:

More information

Signalling Analysis for Adaptive TCD Routing in ISL Networks *

Signalling Analysis for Adaptive TCD Routing in ISL Networks * COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia

More information

Shortest Paths. CS 320, Fall Dr. Geri Georg, Instructor 320 ShortestPaths 3

Shortest Paths. CS 320, Fall Dr. Geri Georg, Instructor 320 ShortestPaths 3 Shortest Paths CS 320, Fall 2017 Dr. Geri Georg, Instructor georg@colostate.edu 320 ShortestPaths 3 Preliminaries Weighted, directed graphs Weight function: maps edges to real numbers Shortest path weight:

More information

Reinforcement Learning and Control

Reinforcement Learning and Control CS9 Lecture notes Andrew Ng Part XIII Reinforcement Learning and Control We now begin our study of reinforcement learning and adaptive control. In supervised learning, we saw algorithms that tried to make

More information

ECEN 689 Special Topics in Data Science for Communications Networks

ECEN 689 Special Topics in Data Science for Communications Networks ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University Lecture 13 Measuring and Inferring Traffic Matrices

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Dominating Set. Chapter 26

Dominating Set. Chapter 26 Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET 294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It

More information

REVISION SHEET DECISION MATHS 2 DECISION ANALYSIS

REVISION SHEET DECISION MATHS 2 DECISION ANALYSIS REVISION SHEET DECISION MATHS 2 DECISION ANALYSIS The main ideas are covered in AQA Edexcel MEI OCR D2 Before the exam you should know The meaning of the different kinds of node. Be able to construct a

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information