Approximating the Virtual Network Embedding Problem: Theory and Practice
|
|
- Marshall Booth
- 5 years ago
- Views:
Transcription
1 Approximating the Virtual Network Embedding Problem: Theory and Practice 2 5 AC 3 B D rd International Symposium on Mathematical Programming 208 Bordeaux, France Matthias Rost Technische Universität Berlin, Internet Network Architectures Stefan Schmid Universität Wien, Communication Technologies
2 A Short Introduction to the Virtual Network Embedding Problem
3 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3
4 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Classic Cloud Computing requests 4 A B D C 3 bunch of VMs User requests virtual machines No guarantee on network performance Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3
5 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Classic Cloud Computing Goal: Virtual Networks (since 2006) requests 4 A B requests 4 A B 6 D C 3 bunch of VMs User requests virtual machines No guarantee on network performance D C 3 Virtual Network Communication requirements given Network performance will be guaranteed Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3
6 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4
7 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r Valid Mapping Virtual Network Substrate (Physical Network) A B AC B Embedding D C D Def: Valid mapping m r = (m V, m E )... m V : V r V S and m E : E r P(E S ) satisfies valid connectivity: valid node mapping: valid edge mapping: m V (i) m E (i,j) m V (i) V i S m E (i, j) E i,j S m V (j) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4
8 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r 6 D C 3 Feasible Embedding Virtual Network Substrate (Physical Network) 4 A 2/3 4/5 B AC B /3 Embedding /2 /2 /2 /2 D 3/3 / Def: Valid mapping m r = (m V, m E )... m V : V r V S and m E : E r P(E S ) satisfies valid connectivity: valid node mapping: valid edge mapping: m V (i) m E (i,j) m V (i) V i S m E (i, j) E i,j S Def: Feasible embedding m r is valid and respects capacities. m V (j) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4
9 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r 6 D C 3 Feasible Embedding Virtual Network Substrate (Physical Network) 4 A 2/3 4/5 B AC B /3 Embedding /2 /2 /2 /2 D 3/3 / Def: Feasible embedding m r is valid and respects capacities. Virtual Network Embedding Problem Setting Online vs. Offline Objectives resource minimization, profit maximization, energy minimization,... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4
10 Related Work & Overview of Contributions
11 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
12 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains VNEP is of crucial importance, yet is hardly understood! Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
13 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
14 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
15 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
16 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
17 Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability a. (FPT-)Linear Programs for computing convex combinations of valid mappings b,c. (FPT-)Approximations for offline VNEP based on randomized rounding b,c. Computational evaluation of derived heuristics for offline profit VNEP b. a Matthias Rost and Stefan Schmid. Charting the Complexity Landscape of Virtual Network Embeddings. In Proc. IFIP Networking, 208c b Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d c Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
18 Complexity of the VNEP Matthias Rost and Stefan Schmid. Charting the Complexity Landscape of Virtual Network Embeddings. In Proc. IFIP Networking, 208c
19 Reminder: 3-SAT and N P-Completeness 3-SAT-Formula φ φ = C i C φ C i with C i C φ being disjunctions of at most 3 (possible negated) literals. Example 3-SAT formula φ over literals L φ = {x, x 2, x 3, x 4 } φ = (x x 2 x 3 ) ( x }{{} x 2 x 4 ) (x }{{} 2 x 3 x 4 ) }{{} C C 2 Definition of 3-SAT Decide whether satisfying assignment a : L φ {F, T} exists for formula φ. Output: Yes/No. Theorem: Karp [972] 3-SAT is N P-complete. C 3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 8
20 Methodology: Proving N P-completeness Proving N P-completeness of the VNEP VNEP lies in N P (answer can be checked in polynomial time). 2 Reduction from 3-SAT to VNEP. Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
21 Our Reduction Framework Proving N P-completeness of the VNEP VNEP lies in N P (answer can be checked in polynomial time). 2 Reduction from 3-SAT to VNEP. Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 0
22 Our Reduction Framework Input: 3-SAT formula φ = (x x 2 x 3 ) ( x x 2 x 4 ) (x 2 x 3 x 4 ) Request G r(φ) V r(φ) = {v i C i C φ } v v 2 v 3 E r(φ) = { (v i, v j ) C i introduces literal used by C j } Substrate G S(φ) one node per clause and per satisfying assignment edges as for the requests, if assignments do not contradict x, x 2, x 3 :TTT x, x 2, x 3 :TTF x, x 2, x 3 :TFT x, x 2, x 4 : TTT x, x 2, x 4 : TTF x, x 2, x 4 : TFT x 2, x 3, x 4 : TTT x 2, x 3, x 4 : TTF x 2, x 3, x 4 : TFT Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 0
23 Complete Picture φ: (x x 2 x 3) ( x x 2 x 4) (x 2 x 3 x 4) G r(φ) : v v 2 v 3 x, x 2, x 3 : TTT x, x 2, x 4 : TTT x 2, x 3, x 4 : TTT x, x 2, x 3 : TTF x, x 2, x 4 : TTF x 2, x 3, x 4 : TTF x, x 2, x 3 : TFT x, x 2, x 4 : TFT x 2, x 3, x 4 : TFT G S(φ) : x, x 2, x 3 : TFF x, x 2, x 3 : FTT x, x 2, x 4 : FTT x 2, x 3, x 4 : TFF x 2, x 3, x 4 : FTT x, x 2, x 3 : FTF x, x 2, x 4 : FTF x, x 2, x 3 : FFT x, x 2, x 4 : FFT x 2, x 3, x 4 : FFT x, x 2, x 4 : FFF x 2, x 3, x 4 : FFF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux
24 Our Reduction Framework Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
25 Our Reduction Framework Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
26 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Example φ = (x x 2 x 3 ) ( x x 2 x 4 ) (x 2 x 3 x 4 ) Request Assignment for φ x T x 2 T x 3 F x 4 F v v 2 v 3 Embedding satisfying conditions () and (2) x, x 2, x 3 : TTF x, x 2, x 3 : TFT x, x 2, x 4 : TTF x, x 2, x 4 : TFT x 2, x 3, x 4 : TTF x 2, x 3, x 4 : TFT x, x 2, x 3 : TFF x 2, x 3, x 4 : TFF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
27 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Decision VNEP is N P-complete under mapping restrictions Node placement restrictions enforce () Routing restrictions enforce (2) v v2 v3 v v2 v3 x, x2, x3 : TTT x, x2, x4 : TTT x2, x3, x4 : TTT x, x2, x3 : TTT x, x2, x4 : TTT x2, x3, x4 : TTT x, x2, x3 : TTF x, x2, x4 : TTF x2, x3, x4 : TTF x, x2, x3 : TTF x, x2, x4 : TTF x2, x3, x4 : TTF x, x2, x3 : TFT x, x2, x4 : TFT x2, x3, x4 : TFT x, x2, x3 : TFT x, x2, x4 : TFT x2, x3, x4 : TFT x, x2, x3 : TFF x2, x3, x4 : TFF x, x2, x3 : TFF x2, x3, x4 : TFF Matthias x, Rost x2, x3 (TU : FTT Berlin) x, Approximating x2, x4 : FTT the Virtual x2, x3, Network x4 : FTT Embedding Problem: x, x2, x3 Theory : FTT and Practice x, x2, x4 : FTT ISMP 208, x2, x3, Bordeaux x4 : FTT 2
28 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Decision VNEP is N P-complete for degree-bounded, planar request graphs Reduction from planar 3-SAT variant using literals max. 4 times (see Kratochvíl [994]): each planar formula φ leads to a planar request graph G r(φ) each node of G r(φ) has degree at most 2 planar graph G φ planar graph G r(φ) u u2 u3 u4 u u2 u3 u4 u u2 u3 u4 v v2 v3 v v2 v3 v v2 v3 v v2 v3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
29 (FPT-)Linear Programs for Computing Convex Combinations of Valid Mappings 2,3 2 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 3 Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL
30 Linear Programming: Classic MCF Formulation and its Limits Classic LP Formulation Formulation : Classic MCF Formulation for the VNEP yr,i= u x r r R, i V r () u V i S u V S \VS i z u,v r,i,j (u,v) δ + (u) z v,u r,i,j (v,u) δ (u) yr,i= u 0 r R, i V r (2) = z u,v r,i,j = 0 d r (i) yr,i= u a τ,u i V r,τ r (i)=τ (i,j) E r [ ] [ yr,i u r R, (i, j) E r, yr,j u u V S [ ] (3) r R, (i, j) E r, (u, v) E S \ E i,j (4) S r r R, (τ, u) RS V (5) d r (i, j) z u,v r,i,j = au,v r r R, (u, v) E S (6) ar x,y c S (x, y) (x, y) R S (7) r R ] Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4
31 Linear Programming: Classic MCF Formulation and its Limits Substrate 2 k 2 j 2 i Example 2 i 2 j LP Solution 2 k Request i k j Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
32 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
33 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
34 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Theorem Decomposing solutions to the MCF LP is not possible in general. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
35 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Theorem Decomposing solutions to the MCF LP is not possible in general. Theorem MCF LP Formulation has infinite integrality gap. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
36 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Key Insight If we fix confluence target nodes valid mappings can always be extracted, when following the extraction order. In the example: Consider one sub-lp formulation per potential mapping location of k. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5
37 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
38 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b a {a} {a, b} {a, b, c} {k} {c} k c Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
39 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! a Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k {i, l} i {l} {j, l} {j} l j {k} k Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
40 Matthias Rost (TU Berlin) Approximating the Virtual NetworkEdge Embedding Bags Problem: Theory and Practice ISMP 208, Bordeaux 6 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! a Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k {i, l} i {l} {j, l} {j} l j {k} k
41 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b a {a} {a, b} a {a, b, c} {k} {c} k c c Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
42 Outline of Novel Decomposable LP Formulations a Pre-Processing Extraction Orders If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k a b c {a, b, c} {k} k b a {a, b} c {c} Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6
43 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7
44 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7
45 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7
46 Outline of Novel Decomposable LP Formulation Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Stitching Flow Variables via Node Mapping Variables y i r,i (i, c), [j j] a {j} {i, l} i {j, l} c f y i r,i (i, a), [i i, l l] y i r,f (i, a), [i i, l l2] γ i r,i,,[j j,l l] γ i r,i,,[j j,l l2] y i r,i (i, c), [j j2] y i r,i (f, i), [j j, l l] y i r,i (f, i), [j j, l l2] y i r,i (i, a), [i i2, l l] γ i r,i,,[j j2,l l] y i r,i (f, i), [j j2, l l] y i r,i (i, a), [i i2, l l2] γ i r,i,,[j j2,l l2] y i r,i (f, i), [j j2, l l2] Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7
47 Outline of Novel Decomposable LP Formulation Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Def. Extraction Width ew X (G X r )... is the size of the largest edge bag plus one of the extraction order ew X (G X r ). Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Proof of Decomposability... via decomposition algorithm. Overall runtime O(poly( G S ew X (G X r ) G r )). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7
48 Novel Decomposable LP Formulation: Takeaways Overview of Construction Request Graph G r Extraction Order Gr X Labeling / Extraction Width ew X (Gr X ) LP of size O(poly( G S ew X (Gr X ) G r )) Decomposition Algorithm with runtime O(poly( G S ew X (Gr X ) G r )) Convex Combinations of valid mappings: D r = {(fr k, mr k ) fr k > 0, mr k M r } Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 8
49 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
50 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width w w 2 w 3 ew X (G X w ) = 2 w c w n w w n/2+2 w w n/2+ n/2 w 2 w 3 ew X (G X w ) V r /2 w c w n w n/2+2 w w n/2+ n/2 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
51 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Vertex Cover Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
52 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Real World Cactus Graph Examples Virtual Cluster VM VM 5 VM 2 VM 4 VM 3 Service Chain LB LB 2 NAT Customer Cache FW Internet Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
53 Extraction Width Overview of Results Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Real World Cactus Graph Examples Virtual Cluster VM VM 5 VM 2 VM 4 VM 3 Service Chain LB LB 2 NAT Customer Cache FW Internet Can we do substantially better? No! Computing valid mappings for planar graphs is N P-complete FPT algorithms are necessary. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9
54 (FPT-)Approximations for offline VNEP based on Randomized Rounding 2,3 2 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 3 Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL
55 Approximating the Offline VNEP Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
56 Approximating the Offline VNEP Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
57 Approximating the Offline VNEP Focus: Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
58 Approximating the Offline VNEP Focus: Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
59 Approximating the Offline VNEP Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Request 4 A B 6 D C 3 Valid Mappings M r = {m r, m 2 r, m 3 r,...} 2/3 4/5 2/3 7/5 AC B AC BD /3 2/3 /2 /2 /2 /2 D 3/3 0/3 Valid mappings do not necessarily respect capacity constraints!... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
60 Approximating the Offline VNEP Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Decomposable LP Formulation allows us to solve Fractional VNEP Is k-th mapping of request r chosen? Select at most one mapping: Enforce capacity for each resource x: Maximize the profit: r R f k r {0, } r R, m k r M r (8) m k r Mr f k r r R (9) A(mr k, x) fr k c S (x) x R S (0) mr k Mr max p r fr k () r R mr k Mr Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2
61 Randomized Rounding Revisited Example Substrate Network Request r : profit 00$ Request r 2 : profit 50$ A B E D C 3 G F 2 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
62 Substrate Network Randomized Rounding Revisited Example Request r : profit 00$ Request r 2 : profit 50$ A B E D C 3 G F 2 Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
63 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
64 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
65 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r 2 (profit: 50$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m2 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
66 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
67 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
68 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% 4 m 2 m 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
69 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% 4 m 2 m 2 50$ 200%..... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22
70 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23
71 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Main Theorem: (FPT-)Approximation for the Virtual Network Embedding Problem The Algorithm returns (α, β, γ)-approximate solutions for the of at least an α fraction of the optimal profit, and allocations on nodes and edges within factors of β and γ of the original capacities, respectively, with high probability. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23
72 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Main Theorem: (FPT-)Approximation for the Virtual Network Embedding Problem The Algorithm returns (α, β, γ)-approximate solutions for the of at least an α fraction of the optimal profit, and allocations on nodes and edges within factors of β and γ of the original capacities, respectively, with high probability. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23
73 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Applicability in Practice: Computing β and γ is hard... Computing β and γ requires enumerating all valid mappings. β O(ε R max r R V r log( V S )) and γ O(ε R max r R E r log( E S )) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23
74 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Applicability in Practice: Computing β and γ is hard... Computing β and γ requires enumerating all valid mappings. β O(ε R max r R V r log( V S )) and γ O(ε R max r R E r log( E S )) Consider Heuristics Return best solution found within X iterations. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23
75 Derived Heuristics Randomized Rounding Approximation Algorithm: VNEP Approximation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24
76 Derived Heuristics Heuristic Idea: Fixed #Iterations Algorithm: Heuristic Adaptation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution RoundingProcedure({D r } r R ) while rounding tries not exceeded return best solution Vanilla Rounding: RR MinLoad still may exceed capacities return solution with least resource violations (among those: highest profit) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24
77 Heuristic Idea: Fixed #Iterations Derived Heuristics Algorithm: Heuristic Adaptation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution RoundingProcedure({D r } r R ) while rounding tries not exceeded return best solution Vanilla Rounding: RR MinLoad still may exceed capacities return solution with least resource violations (among those: highest profit) Algorithm: RoundingProcedure (Heuristic) Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k discard mapping if capacity violated end return solution Heuristic Rounding: RR Heuristic RoundingProcedure: discard chosen mappings exceeding capacities always yields feasible solutions return solution with highest profit Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24
78 Computational Evaluation 4,5 4 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 5 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. Technical report, March 208b. URL
79 Computational Evaluation: Setup Generation Parameters for,500 instances Number of requests: 40, 60, 80, 00 Substrate: GEANT Node-Resource Factor (NRF): 0.2, 0.4, 0.6, 0.8,.0 Edge-Resource Factor (ERF): 0.25, 0.5,.0, 2.0, 4.0 Instances per combination: 5 Requests: Synthetic Cactus Requests Code available: evaluation-ifip-networking-208 ECDF number of nodes: Vr 0.2 number of edges: Er 0. number of cycles: Er Vr Profit: minimum embedding resource costs Node mapping restriction: /4 substrate nodes Demands: exp. dist. according to NRF/ERF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 26
80 Computational Evaluation: Setup Baseline Algorithm MIP MCF : solve classic MIP Formulation for upto 3 hours Acceptance Ratio Avg. Node Load Avg. Edge Load Edge Resource Factor Number of Requests Node Resource Factor Number of Requests Edge Resource Factor Number of Requests Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 26
81 Computational Evaluation: Heuristic Performance Vanilla Rounding Performance Max Load (RRMinLoad) [%] ERF Profit(RR MinLoad )/Profit(MIP MCF ) [%] Relative profit 80-20% Resource augmentations mostly < 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 27
82 Computational Evaluation: Heuristic Performance Vanilla Rounding Performance Heuristic Rounding (w/o augmentations) Max Load (RRMinLoad) [%] ERF Profit(RR MinLoad )/Profit(MIP MCF ) [%] Edge Resource Factor Number of Requests Relative profit 80-20% Resource augmentations mostly < 200% Relative profit 65-90% min: 22.5% / mean: 73.8% / max: 0% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 27
83 Computational Evaluation: Runtimes Runtime MIP MCF (Gurobi 7.5.) Runtime LP novel (Gurobi 7.5.) Edge Resource Factor Node Resource Factor Edge Resource Factor Number of Requests Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 28
84 Computational Evaluation: Formulation Strengths ECDF Bound(MIP MCF ) initial final #Requests Bound(MIP MCF ) / Bound(LP novel ) Root relaxation values upto 3.5 times better than when using the MCF LP. Final MIP bounds improve novel LP bounds by at most a factor of.3. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 29
85 Conclusion
86 Conclusion Summary Complexity: Computing valid mappings is N P-complete for planar graphs. (FPT-)Linear Programs: Valid mappings can be computed in FPT using novel LP. (FPT-)Approximations: For offline VNEP (profit & cost) based on randomized rounding. Evaluation: Solutions quite good even without resource augmentations. Novel formulation is much stronger. Runtime becomes an issue. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3
87 Conclusion Summary Complexity: Computing valid mappings is N P-complete for planar graphs. (FPT-)Linear Programs: Valid mappings can be computed in FPT using novel LP. (FPT-)Approximations: For offline VNEP (profit & cost) based on randomized rounding. Evaluation: Solutions quite good even without resource augmentations. Novel formulation is much stronger. Runtime becomes an issue. Future Work Runtime: Column generation could be readily applied, need to try it. Heuristics: Many possibilities, also for online problem. Extraction width: Can improve the formulation further ( tree-width). Online Approximation: Need to improve rounding scheme (using e.g. Bansal et al. [20]). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3
88 Thank You! Questions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 32
Charting the Complexity Landscape of Virtual Network Embeddings
Charting the Complexity Landscape of Virtual Network Embeddings Matthias Rost Technische Universität Berlin Email: mrost@inet.tu-berlin.de Stefan Schmid University of Vienna Email: stefan schmid@univie.ac.at
More informationPCP and Hardness of Approximation
PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More information9.1 Cook-Levin Theorem
CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two
More informationComputability Theory
CS:4330 Theory of Computation Spring 2018 Computability Theory Other NP-Complete Problems Haniel Barbosa Readings for this lecture Chapter 7 of [Sipser 1996], 3rd edition. Sections 7.4 and 7.5. The 3SAT
More informationGraph Theory and Optimization Approximation Algorithms
Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and
More informationMatching Theory. Figure 1: Is this graph bipartite?
Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More information15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018
15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More information11. APPROXIMATION ALGORITHMS
Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem
More informationChapter 10 Part 1: Reduction
//06 Polynomial-Time Reduction Suppose we could solve Y in polynomial-time. What else could we solve in polynomial time? don't confuse with reduces from Chapter 0 Part : Reduction Reduction. Problem X
More informationUnsplittable Flows. Hoon Cho and Alex Wein Final Project
Unsplittable Flows Hoon Cho (hhcho@mit.edu) and Alex Wein (awein@mit.edu) 6.854 Final Project Abstract An unsplittable flow in a multicommodity network is a flow that routes each commoidty on a single
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,
More informationThe Square Root Phenomenon in Planar Graphs
1 The Square Root Phenomenon in Planar Graphs Survey and New Results Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary Satisfiability
More informationDiscrete Optimization. Lecture Notes 2
Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The
More informationReductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements.
Desiderata Reductions Desiderata. Classify problems according to their computational requirements. Frustrating news. Huge number of fundamental problems have defied classification for decades. Desiderata'.
More informationTowards more efficient infection and fire fighting
Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department
More informationModels of distributed computing: port numbering and local algorithms
Models of distributed computing: port numbering and local algorithms Jukka Suomela Adaptive Computing Group Helsinki Institute for Information Technology HIIT University of Helsinki FMT seminar, 26 February
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationFixed-Parameter Algorithms, IA166
Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer
More informationNP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]
NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What
More informationGraph Balancing: A Special Case of Scheduling Unrelated Parallel Machines
Preprint, Institute of Mathematics, AS CR, Prague. 2007-12-10 Graph Balancing: A Special Case of Scheduling Unrelated Parallel Machines Tomáš Ebenlendr Marek Krčál Jiří Sgall INSTITUTE of MATHEMATICS Academy
More informationCSE 417 Network Flows (pt 3) Modeling with Min Cuts
CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined
More informationCSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation
CSC411 - Linear Programming and Combinatorial Optimization Lecture 1: Semidefinite Programming(SDP) Relaxation Notes taken by Xinwei Gui May 1, 007 Summary: This lecture introduces the semidefinite programming(sdp)
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationThe Complexity of Minimizing Certain Cost Metrics for k-source Spanning Trees
The Complexity of Minimizing Certain Cost Metrics for ksource Spanning Trees Harold S Connamacher University of Oregon Andrzej Proskurowski University of Oregon May 9 2001 Abstract We investigate multisource
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationIn this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard.
In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard. 1 We will show how one can prove such results and then apply this technique to some approximation
More informationIntroduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer
More informationBipartite Matching & the Hungarian Method
Bipartite Matching & the Hungarian Method Last Revised: 15/9/7 These notes follow formulation originally developed by Subhash Suri in http://www.cs.ucsb.edu/ suri/cs/matching.pdf We previously saw how
More informationExample: Map coloring
Today s s lecture Local Search Lecture 7: Search - 6 Heuristic Repair CSP and 3-SAT Solving CSPs using Systematic Search. Victor Lesser CMPSCI 683 Fall 2004 The relationship between problem structure and
More information15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015
15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many
More information1 Introduction and Results
On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationMixed-Integer Optimization for the Combined capacitated Facility Location-Routing Problem
Mixed-Integer Optimization for the Combined capacitated Facility Location-Routing Problem Dimitri Papadimitriou 1, Didier Colle 2, Piet Demeester 2 dimitri.papadimitriou@nokia.com, didier.colle@ugent.be,
More information1. Lecture notes on bipartite matching
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in
More informationJordan Curves. A curve is a subset of IR 2 of the form
Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0,1]}, where γ : [0,1] IR 2 is a continuous mapping from the closed interval [0,1] to the plane. γ(0) and γ(1) are called the endpoints
More informationP vs. NP. Simpsons: Treehouse of Horror VI
P vs. NP Simpsons: Treehouse of Horror VI Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck
More informationComputational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example
Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationNotes for Lecture 24
U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined
More informationOn Modularity Clustering. Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari)
On Modularity Clustering Presented by: Presented by: Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari) Modularity A quality index for clustering a graph G=(V,E) G=(VE) q( C): EC ( ) EC ( ) + ECC (, ')
More information1. Lecture notes on bipartite matching February 4th,
1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationGraph Algorithms Matching
Chapter 5 Graph Algorithms Matching Algorithm Theory WS 2012/13 Fabian Kuhn Circulation: Demands and Lower Bounds Given: Directed network, with Edge capacities 0and lower bounds l for Node demands for
More informationCSE 417 Network Flows (pt 4) Min Cost Flows
CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it
More informationAn upper bound for the chromatic number of line graphs
EuroComb 005 DMTCS proc AE, 005, 151 156 An upper bound for the chromatic number of line graphs A D King, B A Reed and A Vetta School of Computer Science, McGill University, 3480 University Ave, Montréal,
More informationDecomposing Coverings and the Planar Sensor Cover Problem
Intro. previous work. Restricted Strip Cover Decomposing Multiple Coverings Decomposing Coverings and the Planar Sensor Cover Problem Matt Gibson Kasturi Varadarajan presented by Niv Gafni 2012-12-12 Intro.
More informationLecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs
CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 10,11: General Matching Polytope, Maximum Flow Lecturer: Mohammad R Salavatipour Date: Oct 6 and 8, 2009 Scriber: Mohammad
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems
More information12.1 Formulation of General Perfect Matching
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More informationAlgorithmic Challenges in Network Function Virtualized Networks
Algorithmic Challenges in Network Function Virtualized Networks Stefan Schmid TU Berlin & Telekom Innovation Labs (T-Labs) Joint work mainly with Tamás Lukovszki, Matthias Rost, Carlo Fürst Flexible
More informationPaths, Flowers and Vertex Cover
Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is
More informationThe Parameterized Complexity of the Rainbow Subgraph Problem. Falk Hüffner, Christian Komusiewicz *, Rolf Niedermeier and Martin Rötzschke
Algorithms 2015, 8, 60-81; doi:10.3390/a8010060 OPEN ACCESS algorithms ISSN 1999-4893 www.mdpi.com/journal/algorithms Article The Parameterized Complexity of the Rainbow Subgraph Problem Falk Hüffner,
More informationAMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.
AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a
More informationval(y, I) α (9.0.2) α (9.0.3)
CS787: Advanced Algorithms Lecture 9: Approximation Algorithms In this lecture we will discuss some NP-complete optimization problems and give algorithms for solving them that produce a nearly optimal,
More informationMonotone Paths in Geometric Triangulations
Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationApproximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs
Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent
More informationParameterized Complexity of Independence and Domination on Geometric Graphs
Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de
More informationConstrained k-center and movement to independence
Constrained k-center and movement to independence Adrian Dumitrescu Minghui Jiang November 2, 2010 Abstract We obtain hardness results and approximation algorithms for two related geometric problems involving
More informationComputational Complexity CSC Professor: Tom Altman. Capacitated Problem
Computational Complexity CSC 5802 Professor: Tom Altman Capacitated Problem Agenda: Definition Example Solution Techniques Implementation Capacitated VRP (CPRV) CVRP is a Vehicle Routing Problem (VRP)
More informationPacking Edge-Disjoint Triangles in Given Graphs
Electronic Colloquium on Computational Complexity, Report No. 13 (01) Packing Edge-Disjoint Triangles in Given Graphs Tomás Feder Carlos Subi Abstract Given a graph G, we consider the problem of finding
More informationConflict Graphs for Combinatorial Optimization Problems
Conflict Graphs for Combinatorial Optimization Problems Ulrich Pferschy joint work with Andreas Darmann and Joachim Schauer University of Graz, Austria Introduction Combinatorial Optimization Problem CO
More informationUnit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.
: Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity
More informationMinimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes
Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes J.-F. Couturier 1 P. Heggernes 2 D. Kratsch 1 P. van t Hof 2 1 LITA Université de Lorraine F-57045 Metz France 2 University
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationCopyright 2000, Kevin Wayne 1
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationPolynomial-Time Approximation Algorithms
6.854 Advanced Algorithms Lecture 20: 10/27/2006 Lecturer: David Karger Scribes: Matt Doherty, John Nham, Sergiy Sidenko, David Schultz Polynomial-Time Approximation Algorithms NP-hard problems are a vast
More informationIN general setting, a combinatorial network is
JOURNAL OF L A TEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 1 Clustering without replication: approximation and inapproximability Zola Donovan, Vahan Mkrtchyan, and K. Subramani, arxiv:1412.4051v1 [cs.ds]
More informationExpected Approximation Guarantees for the Demand Matching Problem
Expected Approximation Guarantees for the Demand Matching Problem C. Boucher D. Loker September 2006 Abstract The objective of the demand matching problem is to obtain the subset M of edges which is feasible
More informationW[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017
1 W[1]-hardness Dániel Marx Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 2 Lower bounds So far we have seen positive results: basic algorithmic techniques for fixed-parameter
More informationApproximation Algorithms for Wavelength Assignment
Approximation Algorithms for Wavelength Assignment Vijay Kumar Atri Rudra Abstract Winkler and Zhang introduced the FIBER MINIMIZATION problem in [3]. They showed that the problem is NP-complete but left
More informationACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms Given a simple directed graph G = (V, E), a cycle cover is a set of vertex-disjoint directed cycles that cover all vertices of the graph. 1. Show that there
More informationCopyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.
Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible
More informationComplexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 603 631 (2014) DOI: 10.7155/jgaa.00339 Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs Jiong
More informationALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007
ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007 This examination is a three hour exam. All questions carry the same weight. Answer all of the following six questions.
More informationSolving NP-hard Problems on Special Instances
Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances
More informationChapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn
Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple
More information[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra
Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More informationFEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria
FEDOR V. FOMIN Lectures on treewidth The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria Why treewidth? Very general idea in science: large structures can be understood by breaking
More informationarxiv: v1 [cs.ds] 19 Feb 2014
Turing Kernelization for Finding Long Paths and Cycles in Restricted Graph Classes Bart M. P. Jansen 1 University of Bergen, Norway. Bart.Jansen@ii.uib.no arxiv:1402.4718v1 [cs.ds] 19 Feb 2014 Abstract.
More informationExact Algorithms Lecture 7: FPT Hardness and the ETH
Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,
More informationVertex Cover Approximations
CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation
More informationOPERATIONS RESEARCH. Linear Programming Problem
OPERATIONS RESEARCH Chapter 1 Linear Programming Problem Prof. Bibhas C. Giri Department of Mathematics Jadavpur University Kolkata, India Email: bcgiri.jumath@gmail.com 1.0 Introduction Linear programming
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 2: Global properties of Euclidean Steiner Trees and GeoSteiner Marcus Brazil
More informationPaths, Flowers and Vertex Cover
Paths, Flowers and Vertex Cover Venkatesh Raman, M.S. Ramanujan, and Saket Saurabh Presenting: Hen Sender 1 Introduction 2 Abstract. It is well known that in a bipartite (and more generally in a Konig)
More informationWeek 5. Convex Optimization
Week 5. Convex Optimization Lecturer: Prof. Santosh Vempala Scribe: Xin Wang, Zihao Li Feb. 9 and, 206 Week 5. Convex Optimization. The convex optimization formulation A general optimization problem is
More information6 Randomized rounding of semidefinite programs
6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can
More informationDesign and Analysis of Algorithms
CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization
More information