Approximating the Virtual Network Embedding Problem: Theory and Practice

Size: px
Start display at page:

Download "Approximating the Virtual Network Embedding Problem: Theory and Practice"

Transcription

1 Approximating the Virtual Network Embedding Problem: Theory and Practice 2 5 AC 3 B D rd International Symposium on Mathematical Programming 208 Bordeaux, France Matthias Rost Technische Universität Berlin, Internet Network Architectures Stefan Schmid Universität Wien, Communication Technologies

2 A Short Introduction to the Virtual Network Embedding Problem

3 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3

4 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Classic Cloud Computing requests 4 A B D C 3 bunch of VMs User requests virtual machines No guarantee on network performance Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3

5 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 Classic Cloud Computing Goal: Virtual Networks (since 2006) requests 4 A B requests 4 A B 6 D C 3 bunch of VMs User requests virtual machines No guarantee on network performance D C 3 Virtual Network Communication requirements given Network performance will be guaranteed Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3

6 Operators offer their Network Resources Substrate (Physical Network) Directed graph G S = (V S, E S ) Data Center Network Wide-Area Network Capacities c S : G S R 0 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4

7 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r Valid Mapping Virtual Network Substrate (Physical Network) A B AC B Embedding D C D Def: Valid mapping m r = (m V, m E )... m V : V r V S and m E : E r P(E S ) satisfies valid connectivity: valid node mapping: valid edge mapping: m V (i) m E (i,j) m V (i) V i S m E (i, j) E i,j S m V (j) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4

8 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r 6 D C 3 Feasible Embedding Virtual Network Substrate (Physical Network) 4 A 2/3 4/5 B AC B /3 Embedding /2 /2 /2 /2 D 3/3 / Def: Valid mapping m r = (m V, m E )... m V : V r V S and m E : E r P(E S ) satisfies valid connectivity: valid node mapping: valid edge mapping: m V (i) m E (i,j) m V (i) V i S m E (i, j) E i,j S Def: Feasible embedding m r is valid and respects capacities. m V (j) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4

9 requests Goal: Virtual Networks (since 2006) 4 A B 6 D C 3 Virtual Network Virtual Network Request G r = (V r, E r ) demands d r : G r R 0 mapping restrictions VS i V S for i V r E i,j S E S for (i, j) E r 6 D C 3 Feasible Embedding Virtual Network Substrate (Physical Network) 4 A 2/3 4/5 B AC B /3 Embedding /2 /2 /2 /2 D 3/3 / Def: Feasible embedding m r is valid and respects capacities. Virtual Network Embedding Problem Setting Online vs. Offline Objectives resource minimization, profit maximization, energy minimization,... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4

10 Related Work & Overview of Contributions

11 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

12 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains VNEP is of crucial importance, yet is hardly understood! Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

13 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

14 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

15 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

16 Computational Complexity Andersen [2002] N P-hardness (argument) Amaldi et al. [206] N P-hardness and inapproximability for offline VNEP (profit) Related Work Heuristics & Exact Algorithms Generally 00 works, e.g.... Chowdhury et al. [2009] Heuristics based on Linear Programming; hoped for approximations... Approximations None for general graphs! Bansal et al. [20] for trees Even et al. [206] for chains Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability. (FPT-)Linear Programs for computing convex combinations of valid mappings. (FPT-)Approximations for offline VNEP based on randomized rounding. Computational evaluation of derived heuristics for offline profit VNEP. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

17 Idea of this Talk: Give Overview on Our Results Complexity results showing N P-completeness and inapproximability a. (FPT-)Linear Programs for computing convex combinations of valid mappings b,c. (FPT-)Approximations for offline VNEP based on randomized rounding b,c. Computational evaluation of derived heuristics for offline profit VNEP b. a Matthias Rost and Stefan Schmid. Charting the Complexity Landscape of Virtual Network Embeddings. In Proc. IFIP Networking, 208c b Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d c Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

18 Complexity of the VNEP Matthias Rost and Stefan Schmid. Charting the Complexity Landscape of Virtual Network Embeddings. In Proc. IFIP Networking, 208c

19 Reminder: 3-SAT and N P-Completeness 3-SAT-Formula φ φ = C i C φ C i with C i C φ being disjunctions of at most 3 (possible negated) literals. Example 3-SAT formula φ over literals L φ = {x, x 2, x 3, x 4 } φ = (x x 2 x 3 ) ( x }{{} x 2 x 4 ) (x }{{} 2 x 3 x 4 ) }{{} C C 2 Definition of 3-SAT Decide whether satisfying assignment a : L φ {F, T} exists for formula φ. Output: Yes/No. Theorem: Karp [972] 3-SAT is N P-complete. C 3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 8

20 Methodology: Proving N P-completeness Proving N P-completeness of the VNEP VNEP lies in N P (answer can be checked in polynomial time). 2 Reduction from 3-SAT to VNEP. Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

21 Our Reduction Framework Proving N P-completeness of the VNEP VNEP lies in N P (answer can be checked in polynomial time). 2 Reduction from 3-SAT to VNEP. Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 0

22 Our Reduction Framework Input: 3-SAT formula φ = (x x 2 x 3 ) ( x x 2 x 4 ) (x 2 x 3 x 4 ) Request G r(φ) V r(φ) = {v i C i C φ } v v 2 v 3 E r(φ) = { (v i, v j ) C i introduces literal used by C j } Substrate G S(φ) one node per clause and per satisfying assignment edges as for the requests, if assignments do not contradict x, x 2, x 3 :TTT x, x 2, x 3 :TTF x, x 2, x 3 :TFT x, x 2, x 4 : TTT x, x 2, x 4 : TTF x, x 2, x 4 : TFT x 2, x 3, x 4 : TTT x 2, x 3, x 4 : TTF x 2, x 3, x 4 : TFT Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 0

23 Complete Picture φ: (x x 2 x 3) ( x x 2 x 4) (x 2 x 3 x 4) G r(φ) : v v 2 v 3 x, x 2, x 3 : TTT x, x 2, x 4 : TTT x 2, x 3, x 4 : TTT x, x 2, x 3 : TTF x, x 2, x 4 : TTF x 2, x 3, x 4 : TTF x, x 2, x 3 : TFT x, x 2, x 4 : TFT x 2, x 3, x 4 : TFT G S(φ) : x, x 2, x 3 : TFF x, x 2, x 3 : FTT x, x 2, x 4 : FTT x 2, x 3, x 4 : TFF x 2, x 3, x 4 : FTT x, x 2, x 3 : FTF x, x 2, x 4 : FTF x, x 2, x 3 : FFT x, x 2, x 4 : FFT x 2, x 3, x 4 : FFT x, x 2, x 4 : FFF x 2, x 3, x 4 : FFF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux

24 Our Reduction Framework Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

25 Our Reduction Framework Outline of Reduction Framework 3-SAT instance φ VNEP instance (G r(φ), G S(φ), restrictions) φ satisfiable? feasible embedding of G r(φ) on G S(φ) under restrictions? Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

26 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Example φ = (x x 2 x 3 ) ( x x 2 x 4 ) (x 2 x 3 x 4 ) Request Assignment for φ x T x 2 T x 3 F x 4 F v v 2 v 3 Embedding satisfying conditions () and (2) x, x 2, x 3 : TTF x, x 2, x 3 : TFT x, x 2, x 4 : TTF x, x 2, x 4 : TFT x 2, x 3, x 4 : TTF x 2, x 3, x 4 : TFT x, x 2, x 3 : TFF x 2, x 3, x 4 : TFF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

27 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Decision VNEP is N P-complete under mapping restrictions Node placement restrictions enforce () Routing restrictions enforce (2) v v2 v3 v v2 v3 x, x2, x3 : TTT x, x2, x4 : TTT x2, x3, x4 : TTT x, x2, x3 : TTT x, x2, x4 : TTT x2, x3, x4 : TTT x, x2, x3 : TTF x, x2, x4 : TTF x2, x3, x4 : TTF x, x2, x3 : TTF x, x2, x4 : TTF x2, x3, x4 : TTF x, x2, x3 : TFT x, x2, x4 : TFT x2, x3, x4 : TFT x, x2, x3 : TFT x, x2, x4 : TFT x2, x3, x4 : TFT x, x2, x3 : TFF x2, x3, x4 : TFF x, x2, x3 : TFF x2, x3, x4 : TFF Matthias x, Rost x2, x3 (TU : FTT Berlin) x, Approximating x2, x4 : FTT the Virtual x2, x3, Network x4 : FTT Embedding Problem: x, x2, x3 Theory : FTT and Practice x, x2, x4 : FTT ISMP 208, x2, x3, Bordeaux x4 : FTT 2

28 Our Reduction Framework Base Lemma Formula φ is satisfiable if and only if there exists a mapping of G r(φ) on G S(φ), s.t. () each virtual node v i is mapped to a satisfying assignment node of the i-th clause, and (2) all virtual edges are mapped on exactly one substrate edge. Decision VNEP is N P-complete for degree-bounded, planar request graphs Reduction from planar 3-SAT variant using literals max. 4 times (see Kratochvíl [994]): each planar formula φ leads to a planar request graph G r(φ) each node of G r(φ) has degree at most 2 planar graph G φ planar graph G r(φ) u u2 u3 u4 u u2 u3 u4 u u2 u3 u4 v v2 v3 v v2 v3 v v2 v3 v v2 v3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

29 (FPT-)Linear Programs for Computing Convex Combinations of Valid Mappings 2,3 2 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 3 Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL

30 Linear Programming: Classic MCF Formulation and its Limits Classic LP Formulation Formulation : Classic MCF Formulation for the VNEP yr,i= u x r r R, i V r () u V i S u V S \VS i z u,v r,i,j (u,v) δ + (u) z v,u r,i,j (v,u) δ (u) yr,i= u 0 r R, i V r (2) = z u,v r,i,j = 0 d r (i) yr,i= u a τ,u i V r,τ r (i)=τ (i,j) E r [ ] [ yr,i u r R, (i, j) E r, yr,j u u V S [ ] (3) r R, (i, j) E r, (u, v) E S \ E i,j (4) S r r R, (τ, u) RS V (5) d r (i, j) z u,v r,i,j = au,v r r R, (u, v) E S (6) ar x,y c S (x, y) (x, y) R S (7) r R ] Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 4

31 Linear Programming: Classic MCF Formulation and its Limits Substrate 2 k 2 j 2 i Example 2 i 2 j LP Solution 2 k Request i k j Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

32 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Building Block: Multi-Commodity Flows yr,i u [0, ]: maps node i V r on V S z u,v r,i,j [0, ]: maps (i, j) E r on (u, v) E S z u,v r,i,j (u,v) δ + (u) (v,u) δ (u) z v,u r,i,j = yu r,i yu r,j (3) Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

33 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Local Connectivity Property Given a (fractional) mapping of i V r to u V S, a valid mapping can be recovered for edges incident to i and their respective endpoints. Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

34 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Theorem Decomposing solutions to the MCF LP is not possible in general. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

35 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Theorem Decomposing solutions to the MCF LP is not possible in general. Theorem MCF LP Formulation has infinite integrality gap. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

36 Linear Programming: Classic MCF Formulation and its Limits Example Substrate Request i 2 k 2 j 2 i 2 i 2 j LP Solution 2 k k k i j j Extraction Order Main Issue Targets of confluences pose problems! In the example: target k of confluence (i, k), (i, j), (j, k). Key Insight If we fix confluence target nodes valid mappings can always be extracted, when following the extraction order. In the example: Consider one sub-lp formulation per potential mapping location of k. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 5

37 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

38 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b a {a} {a, b} {a, b, c} {k} {c} k c Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

39 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! a Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k {i, l} i {l} {j, l} {j} l j {k} k Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

40 Matthias Rost (TU Berlin) Approximating the Virtual NetworkEdge Embedding Bags Problem: Theory and Practice ISMP 208, Bordeaux 6 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! a Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k {i, l} i {l} {j, l} {j} l j {k} k

41 Outline of Novel Decomposable LP Formulations Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b a {a} {a, b} a {a, b, c} {k} {c} k c c Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

42 Outline of Novel Decomposable LP Formulations a Pre-Processing Extraction Orders If edge e lies on confluence Ci,j X, then it is labeled with the confluence s target j. Labeling can be computed in polynomial-time (by applying Menger s theorem). Each label has unique root node at which the mapping of the label must be fixed. Outgoing edges are partitioned into edge bags not sharing labels. b {a} c {a, b} {a, b, c} {c} {k} k a b c {a, b, c} {k} k b a {a, b} c {c} Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 6

43 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7

44 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7

45 Outline of Novel Decomposable LP Formulation Extraction Order Gr X Rooted acyclic reorientation of the original request graph G r. Gr X is not unique! Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Confluence C X i,j A confluence C X i,j from i to j is a pair of (node-)disjoint paths connecting i to j in G X r. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7

46 Outline of Novel Decomposable LP Formulation Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Stitching Flow Variables via Node Mapping Variables y i r,i (i, c), [j j] a {j} {i, l} i {j, l} c f y i r,i (i, a), [i i, l l] y i r,f (i, a), [i i, l l2] γ i r,i,,[j j,l l] γ i r,i,,[j j,l l2] y i r,i (i, c), [j j2] y i r,i (f, i), [j j, l l] y i r,i (f, i), [j j, l l2] y i r,i (i, a), [i i2, l l] γ i r,i,,[j j2,l l] y i r,i (f, i), [j j2, l l] y i r,i (i, a), [i i2, l l2] γ i r,i,,[j j2,l l2] y i r,i (f, i), [j j2, l l2] Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7

47 Outline of Novel Decomposable LP Formulation Pre-Processing Extraction Orders If edge e Er X lies on confluence Ci,j X, then it is labeled with the confluence s target j. Outgoing edges are partitioned into edge bags not sharing labels. Each label has unique root node at which the mapping of the label must be fixed. Def. Extraction Width ew X (G X r )... is the size of the largest edge bag plus one of the extraction order ew X (G X r ). Generation of Linear Program If e E r is labeled with L X r,e, then V S LX r,e many commodities are considered for e. For each edge bag variables are introduced to enumerate all potential label mappings. Root nodes of labels decide on the confluence s mapping. Proof of Decomposability... via decomposition algorithm. Overall runtime O(poly( G S ew X (G X r ) G r )). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 7

48 Novel Decomposable LP Formulation: Takeaways Overview of Construction Request Graph G r Extraction Order Gr X Labeling / Extraction Width ew X (Gr X ) LP of size O(poly( G S ew X (Gr X ) G r )) Decomposition Algorithm with runtime O(poly( G S ew X (Gr X ) G r )) Convex Combinations of valid mappings: D r = {(fr k, mr k ) fr k > 0, mr k M r } Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 8

49 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

50 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width w w 2 w 3 ew X (G X w ) = 2 w c w n w w n/2+2 w w n/2+ n/2 w 2 w 3 ew X (G X w ) V r /2 w c w n w n/2+2 w w n/2+ n/2 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

51 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Vertex Cover Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

52 Extraction Width Overview of Results Which graphs have bounded extraction width? How to find extraction orders of small width? Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Real World Cactus Graph Examples Virtual Cluster VM VM 5 VM 2 VM 4 VM 3 Service Chain LB LB 2 NAT Customer Cache FW Internet Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

53 Extraction Width Overview of Results Extraction Width: Overview of Results Extraction width may vary by factor Ω( V r ) Minimizing extraction width is N P-hard (via reduction from Vertex-Cover) Cactus graphs (cycles intersect in at most a single node) have bounded extraction width Real World Cactus Graph Examples Virtual Cluster VM VM 5 VM 2 VM 4 VM 3 Service Chain LB LB 2 NAT Customer Cache FW Internet Can we do substantially better? No! Computing valid mappings for planar graphs is N P-complete FPT algorithms are necessary. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 9

54 (FPT-)Approximations for offline VNEP based on Randomized Rounding 2,3 2 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 3 Matthias Rost and Stefan Schmid. (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem. Technical report, March 208a. URL

55 Approximating the Offline VNEP Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

56 Approximating the Offline VNEP Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

57 Approximating the Offline VNEP Focus: Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

58 Approximating the Offline VNEP Focus: Profit Variant A set of request R = {r, r 2,...} is given. Profit for request p r > 0. Task: Embed subset of requests feasibly maximizing the attained profit. Cost Variant A set of request R = {r, r 2,...} is given. Substrate resource costs k S : G S R 0. Task: Find feasible embeddings for all requests minimizing cost. Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

59 Approximating the Offline VNEP Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Request 4 A B 6 D C 3 Valid Mappings M r = {m r, m 2 r, m 3 r,...} 2/3 4/5 2/3 7/5 AC B AC BD /3 2/3 /2 /2 /2 /2 D 3/3 0/3 Valid mappings do not necessarily respect capacity constraints!... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

60 Approximating the Offline VNEP Combine Single Decomposable LP Formulations while enforcing capacity constraints and maximizing the profit. LP for offline VNEP (profit). Decomposable LP Formulation allows us to solve Fractional VNEP Is k-th mapping of request r chosen? Select at most one mapping: Enforce capacity for each resource x: Maximize the profit: r R f k r {0, } r R, m k r M r (8) m k r Mr f k r r R (9) A(mr k, x) fr k c S (x) x R S (0) mr k Mr max p r fr k () r R mr k Mr Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 2

61 Randomized Rounding Revisited Example Substrate Network Request r : profit 00$ Request r 2 : profit 50$ A B E D C 3 G F 2 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

62 Substrate Network Randomized Rounding Revisited Example Request r : profit 00$ Request r 2 : profit 50$ A B E D C 3 G F 2 Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

63 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

64 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r (profit: 00$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

65 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ Variables of r 2 (profit: 50$) Variables of r 2 (profit: 50$) f = 0.5 2/3 4/5 AC B /3 f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m2 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

66 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

67 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

68 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% 4 m 2 m 2 50$ 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

69 Randomized Rounding Revisited Example Solution to Linear Program: Profit 33$ f = 0.5 2/3 4/5 AC B /3 Variables of request f 2 = 0.3 2/3 7/5 AC BD 2/3 f 3 = 0.2 /3 4/5 AC B /3... f 2 = 0.5 3/3 /5 G E 0/3 Variables of r 2 (profit: 50$) f 2 2 = 0.6 3/3 2/5 EF G /3 f 3 2 = 0 5/5 0/3 EFG... /2 /2 /2 /2 /2 D 3/3 0/3 D 3/3 /2 F /3 0/3 0/3 Idea: Treat weights as probabilities! Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Rounding Outcomes Iter. Req. Req. 2 Profit max Load m m $ 200% 2 m 3 00$ 00% 3 m m 2 50$ 200% 4 m 2 m 2 50$ 200%..... Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 22

70 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Algorithm: RoundingProcedure Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k end return solution Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23

71 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Main Theorem: (FPT-)Approximation for the Virtual Network Embedding Problem The Algorithm returns (α, β, γ)-approximate solutions for the of at least an α fraction of the optimal profit, and allocations on nodes and edges within factors of β and γ of the original capacities, respectively, with high probability. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23

72 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Main Theorem: (FPT-)Approximation for the Virtual Network Embedding Problem The Algorithm returns (α, β, γ)-approximate solutions for the of at least an α fraction of the optimal profit, and allocations on nodes and edges within factors of β and γ of the original capacities, respectively, with high probability. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23

73 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Applicability in Practice: Computing β and γ is hard... Computing β and γ requires enumerating all valid mappings. β O(ε R max r R V r log( V S )) and γ O(ε R max r R E r log( E S )) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23

74 First (FPT-)Approximation Algorithm for VNEP Randomized Rounding Approximation Algorithm: VNEP Approximation (Profit) // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded α =/3 Definition of Parameters β =( + ε 2 (V S ) log( V S )) γ =( + ε 2 (E S ) log( E S )) ε = max d max(r, x)/c S (x) r R,x R S (X ) = max x X r R (relative achieved profit) (max node load) (max edge load) (max demand/capacity) (A max(r, x)/d max(r, x)) 2 ( sum over R of squared max (total / single) alloc ) Applicability in Practice: Computing β and γ is hard... Computing β and γ requires enumerating all valid mappings. β O(ε R max r R V r log( V S )) and γ O(ε R max r R E r log( E S )) Consider Heuristics Return best solution found within X iterations. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 23

75 Derived Heuristics Randomized Rounding Approximation Algorithm: VNEP Approximation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution ( RoundingProcedure({D r } r R ) ) solution not (α, β, γ)-approximate while and rounding tries not exceeded Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24

76 Derived Heuristics Heuristic Idea: Fixed #Iterations Algorithm: Heuristic Adaptation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution RoundingProcedure({D r } r R ) while rounding tries not exceeded return best solution Vanilla Rounding: RR MinLoad still may exceed capacities return solution with least resource violations (among those: highest profit) Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24

77 Heuristic Idea: Fixed #Iterations Derived Heuristics Algorithm: Heuristic Adaptation // perform preprocessing compute optimal LP solution compute {D r } r R from LP solution do solution RoundingProcedure({D r } r R ) while rounding tries not exceeded return best solution Vanilla Rounding: RR MinLoad still may exceed capacities return solution with least resource violations (among those: highest profit) Algorithm: RoundingProcedure (Heuristic) Input : Optimal convex combinations {D r } r R foreach r R do choose mr k with probability fr k discard mapping if capacity violated end return solution Heuristic Rounding: RR Heuristic RoundingProcedure: discard chosen mappings exceeding capacities always yields feasible solutions return solution with highest profit Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 24

78 Computational Evaluation 4,5 4 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. In Proc. IFIP Networking, 208d 5 Matthias Rost and Stefan Schmid. Virtual Network Embedding Approximations: Leveraging Randomized Rounding. Technical report, March 208b. URL

79 Computational Evaluation: Setup Generation Parameters for,500 instances Number of requests: 40, 60, 80, 00 Substrate: GEANT Node-Resource Factor (NRF): 0.2, 0.4, 0.6, 0.8,.0 Edge-Resource Factor (ERF): 0.25, 0.5,.0, 2.0, 4.0 Instances per combination: 5 Requests: Synthetic Cactus Requests Code available: evaluation-ifip-networking-208 ECDF number of nodes: Vr 0.2 number of edges: Er 0. number of cycles: Er Vr Profit: minimum embedding resource costs Node mapping restriction: /4 substrate nodes Demands: exp. dist. according to NRF/ERF Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 26

80 Computational Evaluation: Setup Baseline Algorithm MIP MCF : solve classic MIP Formulation for upto 3 hours Acceptance Ratio Avg. Node Load Avg. Edge Load Edge Resource Factor Number of Requests Node Resource Factor Number of Requests Edge Resource Factor Number of Requests Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 26

81 Computational Evaluation: Heuristic Performance Vanilla Rounding Performance Max Load (RRMinLoad) [%] ERF Profit(RR MinLoad )/Profit(MIP MCF ) [%] Relative profit 80-20% Resource augmentations mostly < 200% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 27

82 Computational Evaluation: Heuristic Performance Vanilla Rounding Performance Heuristic Rounding (w/o augmentations) Max Load (RRMinLoad) [%] ERF Profit(RR MinLoad )/Profit(MIP MCF ) [%] Edge Resource Factor Number of Requests Relative profit 80-20% Resource augmentations mostly < 200% Relative profit 65-90% min: 22.5% / mean: 73.8% / max: 0% Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 27

83 Computational Evaluation: Runtimes Runtime MIP MCF (Gurobi 7.5.) Runtime LP novel (Gurobi 7.5.) Edge Resource Factor Node Resource Factor Edge Resource Factor Number of Requests Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 28

84 Computational Evaluation: Formulation Strengths ECDF Bound(MIP MCF ) initial final #Requests Bound(MIP MCF ) / Bound(LP novel ) Root relaxation values upto 3.5 times better than when using the MCF LP. Final MIP bounds improve novel LP bounds by at most a factor of.3. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 29

85 Conclusion

86 Conclusion Summary Complexity: Computing valid mappings is N P-complete for planar graphs. (FPT-)Linear Programs: Valid mappings can be computed in FPT using novel LP. (FPT-)Approximations: For offline VNEP (profit & cost) based on randomized rounding. Evaluation: Solutions quite good even without resource augmentations. Novel formulation is much stronger. Runtime becomes an issue. Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3

87 Conclusion Summary Complexity: Computing valid mappings is N P-complete for planar graphs. (FPT-)Linear Programs: Valid mappings can be computed in FPT using novel LP. (FPT-)Approximations: For offline VNEP (profit & cost) based on randomized rounding. Evaluation: Solutions quite good even without resource augmentations. Novel formulation is much stronger. Runtime becomes an issue. Future Work Runtime: Column generation could be readily applied, need to try it. Heuristics: Many possibilities, also for online problem. Extraction width: Can improve the formulation further ( tree-width). Online Approximation: Need to improve rounding scheme (using e.g. Bansal et al. [20]). Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 3

88 Thank You! Questions? Matthias Rost (TU Berlin) Approximating the Virtual Network Embedding Problem: Theory and Practice ISMP 208, Bordeaux 32

Charting the Complexity Landscape of Virtual Network Embeddings

Charting the Complexity Landscape of Virtual Network Embeddings Charting the Complexity Landscape of Virtual Network Embeddings Matthias Rost Technische Universität Berlin Email: mrost@inet.tu-berlin.de Stefan Schmid University of Vienna Email: stefan schmid@univie.ac.at

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.

More information

9.1 Cook-Levin Theorem

9.1 Cook-Levin Theorem CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two

More information

Computability Theory

Computability Theory CS:4330 Theory of Computation Spring 2018 Computability Theory Other NP-Complete Problems Haniel Barbosa Readings for this lecture Chapter 7 of [Sipser 1996], 3rd edition. Sections 7.4 and 7.5. The 3SAT

More information

Graph Theory and Optimization Approximation Algorithms

Graph Theory and Optimization Approximation Algorithms Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

CSE 417 Branch & Bound (pt 4) Branch & Bound

CSE 417 Branch & Bound (pt 4) Branch & Bound CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity

More information

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem

More information

Chapter 10 Part 1: Reduction

Chapter 10 Part 1: Reduction //06 Polynomial-Time Reduction Suppose we could solve Y in polynomial-time. What else could we solve in polynomial time? don't confuse with reduces from Chapter 0 Part : Reduction Reduction. Problem X

More information

Unsplittable Flows. Hoon Cho and Alex Wein Final Project

Unsplittable Flows. Hoon Cho and Alex Wein Final Project Unsplittable Flows Hoon Cho (hhcho@mit.edu) and Alex Wein (awein@mit.edu) 6.854 Final Project Abstract An unsplittable flow in a multicommodity network is a flow that routes each commoidty on a single

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,

More information

The Square Root Phenomenon in Planar Graphs

The Square Root Phenomenon in Planar Graphs 1 The Square Root Phenomenon in Planar Graphs Survey and New Results Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary Satisfiability

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Reductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements.

Reductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements. Desiderata Reductions Desiderata. Classify problems according to their computational requirements. Frustrating news. Huge number of fundamental problems have defied classification for decades. Desiderata'.

More information

Towards more efficient infection and fire fighting

Towards more efficient infection and fire fighting Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department

More information

Models of distributed computing: port numbering and local algorithms

Models of distributed computing: port numbering and local algorithms Models of distributed computing: port numbering and local algorithms Jukka Suomela Adaptive Computing Group Helsinki Institute for Information Technology HIIT University of Helsinki FMT seminar, 26 February

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch] NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What

More information

Graph Balancing: A Special Case of Scheduling Unrelated Parallel Machines

Graph Balancing: A Special Case of Scheduling Unrelated Parallel Machines Preprint, Institute of Mathematics, AS CR, Prague. 2007-12-10 Graph Balancing: A Special Case of Scheduling Unrelated Parallel Machines Tomáš Ebenlendr Marek Krčál Jiří Sgall INSTITUTE of MATHEMATICS Academy

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

CSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation

CSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation CSC411 - Linear Programming and Combinatorial Optimization Lecture 1: Semidefinite Programming(SDP) Relaxation Notes taken by Xinwei Gui May 1, 007 Summary: This lecture introduces the semidefinite programming(sdp)

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

The Complexity of Minimizing Certain Cost Metrics for k-source Spanning Trees

The Complexity of Minimizing Certain Cost Metrics for k-source Spanning Trees The Complexity of Minimizing Certain Cost Metrics for ksource Spanning Trees Harold S Connamacher University of Oregon Andrzej Proskurowski University of Oregon May 9 2001 Abstract We investigate multisource

More information

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R

More information

In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard.

In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard. In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard. 1 We will show how one can prove such results and then apply this technique to some approximation

More information

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer

More information

Bipartite Matching & the Hungarian Method

Bipartite Matching & the Hungarian Method Bipartite Matching & the Hungarian Method Last Revised: 15/9/7 These notes follow formulation originally developed by Subhash Suri in http://www.cs.ucsb.edu/ suri/cs/matching.pdf We previously saw how

More information

Example: Map coloring

Example: Map coloring Today s s lecture Local Search Lecture 7: Search - 6 Heuristic Repair CSP and 3-SAT Solving CSPs using Systematic Search. Victor Lesser CMPSCI 683 Fall 2004 The relationship between problem structure and

More information

15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015

15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many

More information

1 Introduction and Results

1 Introduction and Results On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Mixed-Integer Optimization for the Combined capacitated Facility Location-Routing Problem

Mixed-Integer Optimization for the Combined capacitated Facility Location-Routing Problem Mixed-Integer Optimization for the Combined capacitated Facility Location-Routing Problem Dimitri Papadimitriou 1, Didier Colle 2, Piet Demeester 2 dimitri.papadimitriou@nokia.com, didier.colle@ugent.be,

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

Jordan Curves. A curve is a subset of IR 2 of the form

Jordan Curves. A curve is a subset of IR 2 of the form Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0,1]}, where γ : [0,1] IR 2 is a continuous mapping from the closed interval [0,1] to the plane. γ(0) and γ(1) are called the endpoints

More information

P vs. NP. Simpsons: Treehouse of Horror VI

P vs. NP. Simpsons: Treehouse of Horror VI P vs. NP Simpsons: Treehouse of Horror VI Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck

More information

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

On Modularity Clustering. Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari)

On Modularity Clustering. Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari) On Modularity Clustering Presented by: Presented by: Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari) Modularity A quality index for clustering a graph G=(V,E) G=(VE) q( C): EC ( ) EC ( ) + ECC (, ')

More information

1. Lecture notes on bipartite matching February 4th,

1. Lecture notes on bipartite matching February 4th, 1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Graph Algorithms Matching

Graph Algorithms Matching Chapter 5 Graph Algorithms Matching Algorithm Theory WS 2012/13 Fabian Kuhn Circulation: Demands and Lower Bounds Given: Directed network, with Edge capacities 0and lower bounds l for Node demands for

More information

CSE 417 Network Flows (pt 4) Min Cost Flows

CSE 417 Network Flows (pt 4) Min Cost Flows CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it

More information

An upper bound for the chromatic number of line graphs

An upper bound for the chromatic number of line graphs EuroComb 005 DMTCS proc AE, 005, 151 156 An upper bound for the chromatic number of line graphs A D King, B A Reed and A Vetta School of Computer Science, McGill University, 3480 University Ave, Montréal,

More information

Decomposing Coverings and the Planar Sensor Cover Problem

Decomposing Coverings and the Planar Sensor Cover Problem Intro. previous work. Restricted Strip Cover Decomposing Multiple Coverings Decomposing Coverings and the Planar Sensor Cover Problem Matt Gibson Kasturi Varadarajan presented by Niv Gafni 2012-12-12 Intro.

More information

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 10,11: General Matching Polytope, Maximum Flow Lecturer: Mohammad R Salavatipour Date: Oct 6 and 8, 2009 Scriber: Mohammad

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

Algorithmic Challenges in Network Function Virtualized Networks

Algorithmic Challenges in Network Function Virtualized Networks Algorithmic Challenges in Network Function Virtualized Networks Stefan Schmid TU Berlin & Telekom Innovation Labs (T-Labs) Joint work mainly with Tamás Lukovszki, Matthias Rost, Carlo Fürst Flexible

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

The Parameterized Complexity of the Rainbow Subgraph Problem. Falk Hüffner, Christian Komusiewicz *, Rolf Niedermeier and Martin Rötzschke

The Parameterized Complexity of the Rainbow Subgraph Problem. Falk Hüffner, Christian Komusiewicz *, Rolf Niedermeier and Martin Rötzschke Algorithms 2015, 8, 60-81; doi:10.3390/a8010060 OPEN ACCESS algorithms ISSN 1999-4893 www.mdpi.com/journal/algorithms Article The Parameterized Complexity of the Rainbow Subgraph Problem Falk Hüffner,

More information

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12. AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a

More information

val(y, I) α (9.0.2) α (9.0.3)

val(y, I) α (9.0.2) α (9.0.3) CS787: Advanced Algorithms Lecture 9: Approximation Algorithms In this lecture we will discuss some NP-complete optimization problems and give algorithms for solving them that produce a nearly optimal,

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent

More information

Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

More information

Constrained k-center and movement to independence

Constrained k-center and movement to independence Constrained k-center and movement to independence Adrian Dumitrescu Minghui Jiang November 2, 2010 Abstract We obtain hardness results and approximation algorithms for two related geometric problems involving

More information

Computational Complexity CSC Professor: Tom Altman. Capacitated Problem

Computational Complexity CSC Professor: Tom Altman. Capacitated Problem Computational Complexity CSC 5802 Professor: Tom Altman Capacitated Problem Agenda: Definition Example Solution Techniques Implementation Capacitated VRP (CPRV) CVRP is a Vehicle Routing Problem (VRP)

More information

Packing Edge-Disjoint Triangles in Given Graphs

Packing Edge-Disjoint Triangles in Given Graphs Electronic Colloquium on Computational Complexity, Report No. 13 (01) Packing Edge-Disjoint Triangles in Given Graphs Tomás Feder Carlos Subi Abstract Given a graph G, we consider the problem of finding

More information

Conflict Graphs for Combinatorial Optimization Problems

Conflict Graphs for Combinatorial Optimization Problems Conflict Graphs for Combinatorial Optimization Problems Ulrich Pferschy joint work with Andreas Darmann and Joachim Schauer University of Graz, Austria Introduction Combinatorial Optimization Problem CO

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information

Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes

Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes J.-F. Couturier 1 P. Heggernes 2 D. Kratsch 1 P. van t Hof 2 1 LITA Université de Lorraine F-57045 Metz France 2 University

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

Copyright 2000, Kevin Wayne 1

Copyright 2000, Kevin Wayne 1 Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Polynomial-Time Approximation Algorithms

Polynomial-Time Approximation Algorithms 6.854 Advanced Algorithms Lecture 20: 10/27/2006 Lecturer: David Karger Scribes: Matt Doherty, John Nham, Sergiy Sidenko, David Schultz Polynomial-Time Approximation Algorithms NP-hard problems are a vast

More information

IN general setting, a combinatorial network is

IN general setting, a combinatorial network is JOURNAL OF L A TEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 1 Clustering without replication: approximation and inapproximability Zola Donovan, Vahan Mkrtchyan, and K. Subramani, arxiv:1412.4051v1 [cs.ds]

More information

Expected Approximation Guarantees for the Demand Matching Problem

Expected Approximation Guarantees for the Demand Matching Problem Expected Approximation Guarantees for the Demand Matching Problem C. Boucher D. Loker September 2006 Abstract The objective of the demand matching problem is to obtain the subset M of edges which is feasible

More information

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 1 W[1]-hardness Dániel Marx Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 2 Lower bounds So far we have seen positive results: basic algorithmic techniques for fixed-parameter

More information

Approximation Algorithms for Wavelength Assignment

Approximation Algorithms for Wavelength Assignment Approximation Algorithms for Wavelength Assignment Vijay Kumar Atri Rudra Abstract Winkler and Zhang introduced the FIBER MINIMIZATION problem in [3]. They showed that the problem is NP-complete but left

More information

ACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms

ACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Given a simple directed graph G = (V, E), a cycle cover is a set of vertex-disjoint directed cycles that cover all vertices of the graph. 1. Show that there

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs

Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 603 631 (2014) DOI: 10.7155/jgaa.00339 Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs Jiong

More information

ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007

ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007 ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007 This examination is a three hour exam. All questions carry the same weight. Answer all of the following six questions.

More information

Solving NP-hard Problems on Special Instances

Solving NP-hard Problems on Special Instances Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances

More information

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple

More information

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph

More information

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,

More information

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria FEDOR V. FOMIN Lectures on treewidth The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria Why treewidth? Very general idea in science: large structures can be understood by breaking

More information

arxiv: v1 [cs.ds] 19 Feb 2014

arxiv: v1 [cs.ds] 19 Feb 2014 Turing Kernelization for Finding Long Paths and Cycles in Restricted Graph Classes Bart M. P. Jansen 1 University of Bergen, Norway. Bart.Jansen@ii.uib.no arxiv:1402.4718v1 [cs.ds] 19 Feb 2014 Abstract.

More information

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Exact Algorithms Lecture 7: FPT Hardness and the ETH Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,

More information

Vertex Cover Approximations

Vertex Cover Approximations CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation

More information

OPERATIONS RESEARCH. Linear Programming Problem

OPERATIONS RESEARCH. Linear Programming Problem OPERATIONS RESEARCH Chapter 1 Linear Programming Problem Prof. Bibhas C. Giri Department of Mathematics Jadavpur University Kolkata, India Email: bcgiri.jumath@gmail.com 1.0 Introduction Linear programming

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 2: Global properties of Euclidean Steiner Trees and GeoSteiner Marcus Brazil

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman, M.S. Ramanujan, and Saket Saurabh Presenting: Hen Sender 1 Introduction 2 Abstract. It is well known that in a bipartite (and more generally in a Konig)

More information

Week 5. Convex Optimization

Week 5. Convex Optimization Week 5. Convex Optimization Lecturer: Prof. Santosh Vempala Scribe: Xin Wang, Zihao Li Feb. 9 and, 206 Week 5. Convex Optimization. The convex optimization formulation A general optimization problem is

More information

6 Randomized rounding of semidefinite programs

6 Randomized rounding of semidefinite programs 6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization

More information