Part 2: Random Routing and Load Balancing

Similar documents
variance of independent variables: sum of variances So chebyshev predicts won t stray beyond stdev.

Second main application of Chernoff: analysis of load balancing. Already saw balls in bins example. oblivious algorithms only consider self packet.

Tail Inequalities Randomized Algorithms. Sariel Har-Peled. December 20, 2002

Network Congestion Measurement and Control

Online Packet Routing on Linear Arrays and Rings

Effective Bandwidth for Traffic Engineering

1.225 Transportation Flow Systems Quiz (December 17, 2001; Duration: 3 hours)

Part 1: Hashing and Its Many Applications

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Randomized Algorithms

Robust Network Codes for Unicast Connections: A Case Study

Shortest Paths & Link Weight Structure in Networks

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

A Signal Processing Approach to the Analysis of Chemical Networking Protocols

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds

Queueing Theory and Simulation. Introduction

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

Minimizing Total Delay in Fixed-Time Controlled Traffic Networks

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes

A Different Kind of Flow Analysis. David M Nicol University of Illinois at Urbana-Champaign

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Signalling Analysis for Adaptive TCD Routing in ISL Networks *

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it?

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation.

Lecture 4: Sampling, Tail Inequalities

Network Design Problems Notation and Illustrations

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

TRAVEL TIME RELIABILITY ON EXPRESSWAY NETWORK UNDER UNCERTAIN ENVIRONMENT OF SNOWFALL AND TRAFFIC REGULATION

A Quantitative View: Delay, Throughput, Loss

Modelling the Arrival Process for Packet Audio

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.

1 Difference between grad and undergrad algorithms

Chapter 2 Queueing Theory and Simulation

Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data

Stability of the Maximum Size Matching

On the Price of Anarchy in Unbounded Delay Networks

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

College of Computer & Information Science Fall 2009 Northeastern University 22 September 2009

These are special traffic patterns that create more stress on a switch

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Optimal Oblivious Routing in Hole-Free Networks

Design of IP networks with Quality of Service

Analysis of Algorithms. Unit 5 - Intractable Problems

RANDOM SIMULATIONS OF BRAESS S PARADOX

Stochastic Network Calculus

COMP9334: Capacity Planning of Computer Systems and Networks

Kousha Etessami. U. of Edinburgh, UK. Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 7) 1 / 13

Achieving Proportional Loss Differentiation Using Probabilistic Preemptive Burst Segmentation in Optical Burst Switching WDM Networks

An Overview of Traffic Matrix Estimation Methods

The Timing Capacity of Single-Server Queues with Multiple Flows

cs/ee/ids 143 Communication Networks

IS 709/809: Computational Methods in IS Research Fall Exam Review

The Complexity of a Reliable Distributed System

ABSTRACT. We investigate the routing and performance of sparse crossbar packet concentrators

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

A Retrial Queueing model with FDL at OBS core node

Fast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify)

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Competitive Management of Non-Preemptive Queues with Multiple Values

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1

Efficient Nonlinear Optimizations of Queuing Systems

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse

EP2200 Course Project 2017 Project II - Mobile Computation Offloading

CS261: A Second Course in Algorithms Lecture #18: Five Essential Tools for the Analysis of Randomized Algorithms

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( )

Congestion In Large Balanced Fair Links

A Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Lecture 24: April 12

Dynamic resource sharing

Performance Analysis of Priority Queueing Schemes in Internet Routers

University of Würzburg Institute of Computer Science Research Report Series. MPLS Traffic Engineering in OSPF Networks - a combined Approach

Lecture 19: Common property resources

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2

CS Communication Complexity: Applications and New Directions

On Channel Access Delay of CSMA Policies in Wireless Networks with Primary Interference Constraints

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

Greedy Online Algorithms for Routing Permanent Virtual Circuits

Relaying Information Streams

Gossip Latin Square and The Meet-All Gossipers Problem

Randomized Algorithms I. Spring 2013, period III Jyrki Kivinen

Delay-Based Back-Pressure Scheduling in. Multihop Wireless Networks

Node-to-set disjoint-path routing in perfect hierarchical hypercubes

Flow-level performance of wireless data networks

Optimal scaling of average queue sizes in an input-queued switch: an open problem

On the Approximate Linear Programming Approach for Network Revenue Management Problems

Routing. Topics: 6.976/ESD.937 1

SAMPLING AND INVERSION

Queues and Queueing Networks

Network Equilibrium Models: Varied and Ambitious

Oblivious Routing in Wireless networks. Costas Busch

Traffic Flow Simulation using Cellular automata under Non-equilibrium Environment

Transcription:

1 Part 2: Random Routing and Load Balancing Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.uk http://www.cl.cam.ac.uk/~ckc25/teaching

Problem: Traffic Routing 2 Suppose you are in charge of transportation. What do you do to reduce congestion? Congestion is caused by traffic demand exceeding the capacity of transport resource To build more roads (to increase capacity)? To raise toll (to reduce demand)? Or to optimize the traffic routes and schedules (from algorithmic design)? Here is a radical idea random routing : 1. A passenger wants to travel from a source to a destination 2. Take a passenger from the source to a random location 3. Then take the passenger from the random location to the destination Does this reduce congestion in transport networks? But this works in computer networks and telecommunication networks

Random Routing in Tech ets 3 Technological networks are interconnections of many nodes of systems and machines High-performance supercomputers require intense communications among computing nodes (CPUs, GPUs, storage units) Telecommunications need to forward numerous calls and data packets across places The connections are often sparse (as to reduce connection costs) Require multihop relaying from nodes to nodes The nodes and links have limited I/O capacity Unprocessed data are buffered in queues Congestion is caused by traffic demand exceeding network capacity at relays and links Random routing is implemented in these networks to reduce congestion and improve performance

Core backbone network Sid C-K Chau AT&T Sprint 80% utilization: 0.00008% 67% utilization: 0.09% 80% utilization: 0.0009% 67% utilization: 0.026% Valient Load Balancing Many Internet backbone networks are massively overprovisioned to provide reliable services Hence, the links are vastly underutilized How can we minimize the resource provision with satisfactory reliability? Valient load balancing: The core backbone network is a full-meshed network Instead of the direct route between the source and destination, the route has to traverse a random intermediate router (i.e., random routing) This balances the traffic among all routers in the core backbone network and averages out the utilization 4 Verio 80% utilization: 0.0003% 67% utilization: 1.1%

Parallel Routing in Hypercube 5 i 1011 1001 101 100 001 111 000 110 1101 011 010 3-dimensional hypercube 0011 d(j) 0111 0010 0110 1010 1111 0001 1110 d(i) 0000 0100 1000 0101 1100 4-dimensional hypercube j Hypercube is an interconnection topology for supercomputers and peer-to-peer networks There are = 2 n nodes, each labelled by an n-bit coordinate There is a link between every pair of nodes with 1 bit difference in their coordinates Each link can transmit one packet at one time, and excessive packets will be buffered at nodes Assume that each node i has a destination d(i), which may not necessarily be a neighbour (hence requiring multihop forwarding and buffering at relays) What is the minimum schedule of parallel routing (i.e., a sequence of sets of activated links) to forward the traffic from all the sources to destinations? Any simple algorithms? Computationally hard to find the minimum schedule by deterministic algorithms

Bit-fixing Routing in Hypercube 6 i 1011 1001 0011 0010 0110 1010 1111 0001 1110 d(i) 0000 0100 1000 0101 1100 1101 Bit-fixing routing j d(j) 0111 i d(i) 0000 0000 0001 0100 0010 1000 0011 1100 0100 0001 0101 0101 0111 1101 1110 1011 1111 1111 A worst-case configuration A simple routing algorithm is oblivious to other flows -- find the shortest path between source and destination Bit-fixing routing is to find a path (i 1, i 2,, d(i 1 )), where (i t, i t+1 ) differ in only one bit for all t if (i t-1, i t ) differ in the k-th leftmost bit and (i t, i t+1 ) differ in the l-th leftmost bit, then k < l There exists a configuration of sources and destinations that requires at least 2 n/2 /2 steps by bit-fixing routing Consider n is even, for every source i = (l i r i ), we assign the destination to be d(i) = (r i l i ) (i.e., d(i) is a transpose permutation of i) Then for source i = (?...?1 0...00) and its destination d(i) = (0...00?...?1) (i.e., l i is odd and r i is zero), it must traverse (0...01 0...00) by bit-fixing routing There are 2 n/2 /2 nodes with address (?...?1 0...00) Only one source can traverse (0...01 0...00) at one step At least 2 n/2 /2 steps needed for relaying from these nodes

Random Routing in Hypercube 7 i 1011 1001 0011 r(j) 0010 0110 1010 1111 0001 1110 d(i) 0000 0100 1000 1100 0101 r(i) 1101 j d(j) Random bit-fixing routing 0111 i r(i) d(i) 0000 0000 0000 0001 0001 0100 0010 1000 1000 0011 0101 1100 0100 0001 0001 0101 1110 0101 0111 1101 1101 1110 0000 1011 1111 1110 1111 A two-stage configuration For deterministic bit-fix routing, the worst case requires at least 2 n/2 /2 steps (exponential in n) But for random bit-fix routing, it requires O(n) steps with high probability (i.e., using more than O(n) steps has a vanishing probability converging to 0, as n 0) Random bit-fix routing has two stages: 1. Pick a random node r(i) in the hypercube independently, and use bit-fixing routing from i to r(i) 2. Use bit-fixing routing from r(i) to d(i) Obviously, longer paths are needed for random bit-fix routing. Then why is this better? The intuition is that random routing can average out the worst case configuration from deterministic routing The probability that a randomly generated configuration is the worst case is very low, and is vanishing for large n This intuition is behind many randomized algorithms

Principle of Random Routing 8 It suffices to show that it requires O(n) steps with high probability for the first stage of random bit-fixing routing For each source i, let P i be the random path to a random node We observe a property of bit-fixing routing: If P i and P j intersect, then there is only one subpath of intersection P i and P j cannot intersect at multiple disjoint subpaths, as there is a unique path between any pair of nodes Let 1(P i, P j ) be the indicator function for testing if P i and P j intersect 2 The delay for source i is bounded by: delay i n j=1 1(P i, P j ) Hence, the expected delay: E[delay i ] E 2 n 2 n j=1:j i 1 P i, P j = j=1:j i E 1 P i, P j j=1:j i P e P j where e P j denotes that e is a link in the path P j P i P j 010 100 e P i 110 111 2 n ot possible Continue in the next slide

Follow from the last slide Principle of Random Routing ote that there are n2 n 1 links in a hypercube and 2 n paths by bit-fixing, where each path has at most n links Thus, the expected number of paths including a particular link e is 2: P e P j = 2. ote that P j contains at most n links 2 n j=1 2 Therefore, E[delay i ] n j=1:j i E 1 P i, P j 2n 2 Our aim is to show that P n j=1:j i 1 P i, P j cn 1 n for some c Hence, P delay i cn 1 n (i.e., it takes O(n) steps with high probability) 2 We note that P i and P j are independent random variables (because r(i) and r(j) are picked independently) So 1 P i, P j and 1 P i, P k are independent random variables for i j k i Let X j 1 P i, P j be a Bernoulli random variable: P X j = 1 = E X j n Obtaining the distribution of sum of independent Bernoulli random variables, P x, requires the famous Chernoff Bound j=1 X j 2 9 n2 n 1

We are interested in P j=1 X j Chernoff Bound x, which is called tail distribution First, we use Markov inequality, P X x E X for positive x. Hence x P which is not sufficiently small when x =cn j=1 X j x E X j x n x But we can strengthen Markov Inequality by: P X x = P e tx e tx for any positive t, E e tx Hence P X x min (a.k.a. Chernoff Bound) t>0 e tx When X is a sum of independent Bernoulli random variables, E e tx = E e t j=1 X j = E e tx j j=1 E etx e tx = E e tx j = (pe t + 1 p ) = (1+p(e t 1)) ote that 1 + y e y, thus we have E e tx e (et 1)E X j e ext, we obtain P j=1 X j x min (et 1)E X j and we let t = ln(1 + δ) t>0 e tx P j=1 X j (1 + δ)e X j e δ (1+δ) 1+δ If we let be sufficiently large, then P E X j X j j=1 ce X j 1 2 Hence, for random bit-fixing routing, P delay i c n 1 2 n E X j 10

Summary 11 Random routing takes a detour to a random intermediate node before reaching the destination Random routing can average out the worst case traffic patterns to deterministic routing algorithms Random routing has been implemented in telecommunication networks (Valient load balancing) and in supercomputer architecture (parallel routing in hypercube) A key tool to prove the effectiveness of random routing is based on the Chernoff bound which estimates the exponential tail distribution of a sum of independent Bernoulli random variables Hence, the probability that routing random deviates from the expected value is exponentially small in the size of network

References 12 Main reference: Mitzenmacher and Upfal book, Probability and Computing: Randomized Algorithms and Probabilistic Analysis Chapter 4.5: Packet routing in sparse networks Chapter 4.2: Chernoff bound Additional reference Rui Zhang-Shen and ick McKeown, Designing a Predictable Internet Backbone with Valiant Load-Balancing, Proceeding of Workshop of Quality of Service (IWQoS) 2005 More related materials are available at http://www.cl.cam.ac.uk/~ckc25/teaching