arxiv:cs/ v1 [cs.ni] 6 Sep 2003

Size: px
Start display at page:

Download "arxiv:cs/ v1 [cs.ni] 6 Sep 2003"

Transcription

1 LSU-CSC-TR-, JUNE ST, arxiv:cs/9v [cs.ni] Sep The KR-Benes Network: A Control-Optimal Rearrangeable Permutation Network based on K-bounded Permutations Rajgopal Kannan Department of Computer Science Louisiana State University Baton Rouge, LA 8 rkannan@csc.lsu.edu Abstract The Benes network has been used as a rearrangeable network for over years for applications in circuit switching and packet routing. However the O(N logn) control complexity of the Benes is not optimal for many permutations. In this paper, we present a novel rearrangeable network that is permutation-specific control-optimal, i.e., it has the lowest control complexity for every input permutation. This network is based on another network we label KR-Benes. The KR-Benes exploits locality properties of permutations (called K-boundedness) and is derived by making some small modifications to the Benes. The KR- Benes network has a depth of log K + stages and a control complexity ofo(n logk). The KR-Benes is superior to the Benes from the hardware point of view for K N/ 8 and has a lower control complexity when K N/. In this paper, we show that any optimal network for rearrangeably routing K-bounded permutations must have depth at least logk +. We also provide arguments for conjecturing that the optimal network, in fact has logk + stages, and therefore the KR-Benes is optimal. Finally, we use the KR-Benes to derive the permutationspecific control-optimal network for routing arbitrary permutations. Its control complexity is superior to the Benes in most cases and bounded by the Benes in the worst case. Keywords: Graph Theory, Benes Network, Permutation Routing, Rearrangeability, Optimal Control Algorithm. I. INTRODUCTION The title of this paper really ought to be The Benes network is more powerful than imagined. Simply put, in this paper we present the remarkable result that by making a few small modifications to the Benes network [], This work was supported by DARPA/AFRL under grant # F- -- and Louisiana Board of Regents under grant # LEQSF(- )-RD-A-. the resulting rearrangeable network can route most permutations with much lower latency and control overhead. The worst-case control complexity of the new rearrangeable network is in fact bounded by the Benes. The Benes network is one of the oldest and best-known rearrangeable permutation networks []. It has been in use for over years, with traditional applications such as circuit switching in telecommunication systems and time division multiple accessed (TDMA) systems for satellite communication to newer applications such as packet switches in internet routers []. Many packet switches based on combined input-output queing models require a permutation network in the middle of the switch fabric for routing packets from input queues to output ports during each time slot []. Rearrangeable permutation networks also find application in optical switching. Optical connections can be routed through a Benes so that no switching element is shared by more than one connection, thereby making the switch crosstalk-free ([8], []). Given the widespread use of permutation networks, improving their control and hardware complexity has tremendous implications. This therefore raises the question: How optimal is the Benes in this regard? It is well known that for routing arbitrary permutations, the Benes is the smallest switching element based rearrangeable network, with a depth of logn stages and a control complexity ofo(n logn) using the looping algorithm []. However, the hardware and control complexity of the Benes is uniform for routing all permutations. For example, both identity as well as inverse permutations are Note that other well-known permutation networks such as the Clos and Crossbar [] have fewer stages than the Benes but they are not based on switching elements. Being non-blocking, these are obviously more powerful than the Benes, but are correspondingly more complex to implement (O(N ) crosspoints, as opposed too(n logn) for the Benes).

2 LSU-CSC-TR-, JUNE ST, routed in a smilar manner, though they are very different in structure. Our work in this paper is motivated by the fact that connection requests to a switching network very often reflect locality properties of the sources and destinations. In many cases, traffic sources may be constrained in their ability to connect to various destinations by quality of service considerations such as delay or path length. Connection requests from such sources will therefore not be arbitrary but very specific. Consider for example, specific processor-memory pairings in a shared-memory multiprocessor system or requests by clients to specific servers for updates based on transaction attributes, in a distributed system. We label such permutations as K-bounded (a term we will formally define shortly). We then design a rearrangeable network labeled KR-Benes for optimally routing these permutations. If the network traffic is known to exhibit the boundedness properties statically (i.e., the maximum value of K is bounded by N and does not increase with time), then a KR-Benes network can be used instead of the standard N N Benes with concommitant hardware and control complexity benefits. However, in most realistic cases, the value of K among connection requests will change dynamically over time. A set of traffic connections with a given value of K may persist over a few time slots and be replaced by a new set with higherk. We therefore design a permutation network that has the lowest control complexity for dynamically arriving traffic streams with varying values ofk. The worst-case control complexity of this network is bounded by O(N logn), the control complexity of a standard Benes network. We summarize our contributions in this paper as follows: A new rearrangeable permutation network based on K-bounded permutations. This network has a depth of logk + stages and a control complexity of O(N log K). The KR-Benes is preferable to the Benes from the hardware point of view for K N 8 and has a lower control complexity whenk N. We show that any optimal network for rearrangeably routing K-bounded permutations must have depth at least log K +. We provide arguments for conjecturing that the optimal network in fact haslogk+ stages and therefore the KR-Benes is optimal. A new control-optimal rearrangeable network that can be used for any permutation. This network is superior to the Benes in most cases and bounded by the performance of the Benes in the worst case. The new rearrabgeable network dynamically routes every input permutation with the lowest permutationspecific control complexity unlike the Benes which has uniform complexity. The paper is organized as follows: In section, we briefly describe some of the specific terminology and background needed to understand our description of the proposed rearrangeable switching networks. In section, we formulate our problem. Section contains the KR- Benes architecture and control algorithm for routing K- bounded permutations. Section discuses lower bounds on the complexity of a K-bounded rearrangeable network. Section describes CORN, our control-optimal rearrangeable network whose worst-case control complexity is bounded by the Benes. Section concludes the paper. II. BACKGROUND An N N switching network denotes a network for interconnecting N inputs and N outputs. Let π : [,..,N ] [,.., N ] denote a permutation on N inputs. π(i) represents the output request of input i. π can also be represented by the permutation graph Π, a bipartite graph on vertices V = [,...,N ] and V = [,...,N ]. There is an edge between i V and j V if j = π(i). When applied to interconnection networks, pairs of adjacent vertices in V and V are grouped together to logically represent a switching element. Let S i denote the switching element of input i. i denotes its companion input, where i = i if i is odd, and i + otherwise. Thus, there is an edge in Π from each switching element S i to switching elements S π(i) and S π(i). A path in the permutation graph alternately traverses switching elements on the input and output side. A switching network capable of handling all possible permutations on N is called a permutation network. Permutation requests from traffic inputs arise in many cases, for example in circuit switched networks for telecommunications, combined input-output queueing based packet switches and routers, and cross-talk free optical networks. A permutation network is rearrangeable if for any permutation π, we can construct edge-disjoint paths in the network linking the i th input to the π(i) th output for i N. The Benes network is an example of a rearrangeable network. There are several ways to describe the architecture of the Benes. We describe it in terms of Butterfly and Inverse Butterfly networks. An N N Butterfly [] consists of logn columns (or stages) of switching elements arranged in the recursive structure shown in Figure. An Inverse Butterfly network is the mirror image of a Butterfly. All logarithms are to base, unless otherwise stated.

3 LSU-CSC-TR-, JUNE ST, N/ X N/ Cube []. N (i) N/ X N/ Cube N Fig. (I) RECURSIVE STRUCTURE OF THE BUTTERFLY NETWORK (II) AN 8 8 BUTTERFLY NETWORK. An N N Benes network consists of an N N Butterfly followed by an Inverse Butterfly. Thus the Benes contains log N stages of switching elements. However the last stage of the Butterfly network can be merged with the first stage of the Inverse Butterfly to decrease the total number of stages to logn. Figure illustrates an 8 8 Benes. Note that the recursive structure of the Butterfly and Inverse Butterfly networks automatically leads to a recursive decomposition of the Benes network. An N N Benes can be viewed as consisting of two outer stages of switching elements connected to top and bottom N N Benes subnetworks. This is very useful in deriving the looping algorithm [] for routing permutations in the network. a b c d e f g h a f d g b c e h Fig. x Benes x Benes (ii) f d a NETWORK ARCHITECTURE AND CONTROL ALGORITHM FOR AN 8 8 BENES. Figure also shows an example of the looping algorithm. It begins by setting a switching element in the outer left stage such that companion inputs are directed to top and bottom subnetworks. The destination switching elements in the outer right stage must automatically be set to receive these inputs from the correct subnetworks. By alternately setting switches in the outer stages, the entire permutation can be divided into two smaller permutations to be realized at each Benes subnetwork. The looping algorithm sequentially examines the inputs in each stage and hence the control complexity of the Benes is O(N logn). The parallel version of the looping algorithm has complexity O(log N) using O(N) processors h c g b e III. PROBLEM STATEMENT In this paper, we consider the design of a rearrangeable switching network for inputs in which the permutation π satisfies the boundedness condition: π(i) i k, for all inputsi, i N andk is any integer in[...n ]. Let K N be the smallest integer k, which is also a power of. We label such permutations as K-bounded permutations. Given a K-bounded permutation, what is the optimal network composed of switching elements that can rearrangeably route inputs to outputs? For K = N, it is well known that the N N Benes is the smallest (and hence optimal) rearrangeable network in terms of hardware and control complexity. However, to the best of our knowledge, this problem remains unsolved for K < N. In this paper, we show that the lower bound for the depth of such a network (the number of stages) is at least logk +. We then describe an almost optimal network for K-bounded permutations with logk + stages. We conjecture that our solution is in fact optimal. In section, we provide arguments for showing that the proposed lower bound is not tight and that one more stage is required, but at the moment this lacks the status of a formal proof. Finally, we use our solution for a K-bounded rearrangeable network to design a control-optimal rearrangeable network for arbitrary permutations. The worst case control complexity of our network is bounded by the Benes. In all other cases, its control complexity is much superior to the Benes, provably within a sub logn additive factor of the optimal and conjectured optimal. IV. KR-BENES: PROPOSED K-BOUNDED REARRANGEABLE BENES SWITCHING NETWORK For the givenk-bounded permutation, divide the set of N inputs (outputs) into N K bands of K contiguous inputs (outputs) each. Each such input (output) set is labeled I i (O i ), I i = [ik,...,(i + )K ] = O i, i N K. Thus for the given permutation π, inputs in I i are destined only to the same or adjacent bands, i.e., π(j) {O i,o i,o i+ }, j I i. For each input band, further define subsets I i,u I i and I i,d I i, where I i,u = {j : π(j) O i } and I i,d = {j : π(j) O i+ }. Also define I i,s = I i (I i,u Ii,D ). Members ofi i,u andi i,d represent migrating inputs destined to the upper and lower bands respectively, while members of I i,s represent stationary inputs, destined within the same band. Clearly,I i,u = I i,d and I i,d = I i+,u.

4 LSU-CSC-TR-, JUNE ST, 8 9 X Cube M X Cube M X Cube M X Cube M Matching Networks Band Exchange Networks Fig. X Inverse Cube R X Inverse Cube R X Inverse Cube R X Inverse Cube R Routing Networks SCHEMATIC OF AN N N KR-BENES NETWORK,N =, K =. Figure describes a schematic of the proposed KR- Benes permutation network for a given value of K. The network consists of logk + columns of switching elements and can be logically divided into three component stages by function. Packets in the network first go through a matching stage implemented via a matching network followed by a band-exchange stage implemented via shuffle-exchange interconnections, and finally a routing stage where packets are routed to their final destinations. The first logical stage of the KR-Benes network consists of N/K matching networks M i, stacked over each other. Each matching network is the equivalent of a K K Butterfly network and consists of logk columns of switching elements. The second logical stage consists of two successive columns of N switching elements, each implementing a shuffle-exchange interconnection. The first column implements a shuffle exchange between the outputs of M r and M r+, r N K. The second column has shuffle-exchange interconnections between the outputs of M r+ and M r+, r N K. The third logical stage of the KR-Benes consists of N/K routing networks R i stacked over each other, where each R i is ak K Inverse Butterfly. It can be seen that each concatenated M i R i network pair forms a K K Benes network. Also note that if the middle two columns of shuffle-exchange interconnections are removed, then the entire structure is isomorphic to the first and last K stages of a regular N N Benes. Indeed, the p th column of the KR-Benes is obtained by a K -way p perfect shuffle of the p th Benes network stage, p log K. However, we present the KR-Benes architecture An R-way perfect shuffle of N inputs is obtained by grouping the inputs inton/r groups ofrcontiguous inputs each and taking a perfect shuffle of the groups. in the above manner for notational simplicity in our proof that the network is indeed rearrangeable for K-bounded permutations. We first explain the intuition behind this design of the KR-Benes followed by the formal proof of its permutation capability. Let I i and O i denote the set of inputs and outputs of network M i. Notations I i,u, I i,d and I i,s have the same meaning as before. The main intuition behind our network design is as follows: Clearly, a K K Benes is sufficient to route all inputs in I i,s to their destinations if we don t care about the positions of inputs in I i,u and I i,d. However, if in the processing of routing members of I i,s, we can match each of the remaining inputs in I i with a counterpart in the adjacent bands, then they can be exchanged with this counterpart. This requires that each migrating input and its counterpart arrive at prefixed spatial lines (outputs) in their respective K K networks, where they can be exchanged via a switching element. The outcome of this exchange will be to position each input in the N N network within its proper destination band, whence it can be routed to the appropriate output line. Note that this observation immediately yields a logk+ stage network for routing K-bounded permutations as follows: First, position all I i,u and I i,d packets in the network at the topmost and bottommost outputs in their respective bands. This can be done using the simple O(K) sequential control algorithm on a K K banyan network described in []. Two stages of shuffle-exchange interconnections then position all packets within their correct bands. A K K Benes can then be used to route all packets to their respective outputs. The total number of stages in this network is thus logk +. However, one can obtain a better solution by noting the following: During the match routing process some of the inputs within a band are likely to be closer to their final destinations than others. For example, inputs in I i,s are potentially being routed towards their destinations while migrating inputs are only being match routed. The complexity of the permutation network depends on the number of stages required for match routing as well as the worst-case distance of packets from their final destinations at the end of the match routing process. Therefore, to obtain optimal or near optimal solutions, we need to design a network which requires minimal number of stages for match routing while simultaneously ensuring that all packets are as close as possible to their destinations. Remarkably, the Benes network itself possesses

5 LSU-CSC-TR-, JUNE ST, these properties, as we will show below. We summarize the steps in our KR-Benes permutation routing algorithm below. Route the inputs in each matching network using the control settings obtained by executing the looping algorithm. Since the KR-Benes is an isomorphic subgraph of the Benes, we can set the switching elements in the first and last logk stages of then N Benes using the looping algorithm and then set the isomorphic switching elements in each matching network identically. Equivalently, one can consider the stacked top and bottom subnetworks of each matching network as the top and bottom subnetwork of the Benes and set the switching elements accordingly. Exchange each migrating input in I i,u and I i,d with a matching input in I i,d and I i+,u, respectively. Matching inputs have the property that they appear at the same output lines of their respective matching networks, i.e.,m i andm i orm i andm i+, respectively. We will more formally define the matching input property shortly. Route inputs over each routing network using the control settings obtained previously by the looping algorithm. Both the KR-Benes network architecture and the control algorithm are straightforward. The only hard part of the process lies in recognizing that K-bounded permutations can be routed by dividing the inputs into bands and noting that migrating inputs can be matched in adjacent bands when using the Benes control algorithm. The formal proof that matching inputs exist is straightforward using induction, as we show below. We first define the concept of matching inputs below. Definition : Matching : a I i,d and b I i+,u are said to be matching if they traverse the same sequence of top and bottom subnetworks in their respective matching networks. Matching is similarly defined for inputs in I i,u and I i,d, i (N/K). Note that the definition implies two matching inputs will appear at the same output line after passing through log K stages of switching elements. The idea of matching inputs clearly applies within an N N Benes network as well, where inputs traversing the same sequence of top and bottom Benes subnetworks enroute to their destination can be said to be matching. Before proving the validity of the KR-Benes network, we first prove the following matching lemma. Lemma : Let P be any set of inputs and π a K- bounded permutation on P, where P K. Divide P into P/K contiguous bands of size K, with I i, O i, I i,u, I i,d etc. having the same meaning as before. Route these inputs to top (T ) and bottom (B) subnetworks in the next stage using the standard Benes network control algorithm. Let Ii,U T and IB i,u (IT i,d and IB i,d, resp.) represent inputs in I i,u (I i,d resp.) directed to the top and bottom subnetwork. Then for all i, i P K, we have, I T i,u = I T i,d () I B i,u = IB i,d () I T i,d = I T i+,u () I B i,d = IB i+,u () Proof: We prove the matching lemma by induction on P. For the base case, consider permutation π on a set of K inputs divided into adjacent bands I and I. The Benes network looping algorithm alternately routes members of each input and output pair to opposite subnetworks. Let S a denote the switching element corresponding to input pair a and a (a = a if a is odd and a + otherwise). In the permutation graph Π, there is an edge from each switching element S a to switching elements S π(a) and S π(a). Clearly, the looping algorithm can be viewed in terms of alternating paths inπ. We construct a compatibility graph G = (V,E) based on the permutation graph Π as follows: Each edge in Π between a migrating input in I or I to an output in O or O is represented as a vertex in V. V is further divided into two subsets on the basis of endpoints ini ori. More formally, V = V V, wherev = {(a,π(a)) a I,D } and V = {(b,π(b)) b I,U }. There are two kinds of edges between vertices in V. Edges betwen V and V are labeled as cross edges while the remaining edges are labeled straight edges. There exists a cross edge between vertices u = (a,π(a)) and u = (b,π(b)) if a and b are in different bands and there exists a path of odd length in Π between S a and S π(b) or between S b and S π(a). Finally, a cross edge is labeled i if it arises due to an odd length path consisting only of switching elements ini i and O i. There exists a straight edge between vertices u = (a,π(a)) and u = (b,π(b)) if a and b are in the same band (either I or I ), and there exists a path of even length (including paths of length zero) in Π between S a and S b or S π(a) and S π(b). As before, a straight edge is labeled i if it arises due to an even length path consisting only of switching elements in I i and O i. Figure illustrates the compatibility graph corresponding to the given permutation on 8 inputs. The cross edge between vertices (,) and (,) is labeled since it arises due to a path of length one ini. The straight edge between (,) and (,) is labeled since it arises due to a path of length zero in

6 LSU-CSC-TR-, JUNE ST, both I and I. (i) Outputs Fig. (,) (,) (,) (,) (,) (,) V V (I) PERMUTATION GRAPH AND (II) THE CORRESPONDING COMPATIBILITY GRAPH. CROSS EDGES ARE SHOWN DASHED. A compatibility graph G has the following properties: Property : G does not have any odd length cycles. Proof: Property follows since every cycle must contain an equal number of edges labeled and. Property : G does not have any cycles containing an odd number of straight edges. Proof: A cycle with an odd number of straight edges would also have to have an odd number of cross edges in order to satisfy property. However, any cycle must have an even number of cross edges, since otherwise one would end up in V from V and vice versa. Thus no cycle with an odd number of straight edges can exist. Property : Any pair of vertices in G connected by a cross edge represent inputs that are directed to the same Benes subnetwork (either top or bottom) and hence represent matching inputs for this stage. Proof: Property follows since vertices sharing a cross edge are connected by a path of odd length inπand the looping algorithm for Π directs consecutive edges on a path to alternating top/bottom subnetworks. Property : Vertices connected by a straight edge in G represent pairs of inputs that are directed to opposite Benes subnetworks. Proof: This follows by an argument similar to property, based on the definition of a straight edge. Property : The number of vertex pairs in V and V connected by straight edges labeled is identical. Proof: If a vertex in V (V ) is not connected to a vertex inv (V ) by a cross edge labeled, then it must be connected to another vertex in V (V ) by a straight edge labeled. Hence there must be an identical number of such pairs inv and V. Lemma : I T,U = I T,D I B,U = I B,D (ii) Proof: By property, all inputs connected by cross edges labeled are directed to the same top or bottom subnetwork. By properties and, all inputs in V connected by straight edges labeled have a matching input in V that is directed to the same subnetwork. Properties and ensure that edges labeled do not create conflicts/inconsistencies in the matching. Lemma therefore proves the base case of the induction hypothesis. Now consider any K-bounded permutation on P inputs and assume the inductive hypothesis holds for fewer thanp inputs. We will need to find an exact matching between inputs ini,d andi,u. Assume for the moment that such a matching exists and let y i I,D be the matching input for each x i I,U, i I,U. Consider the permutation π on P K inputs defined as follows: π(x i ) = π(y i ) i I,U π(a) = π(a) for all other inputs a. π is ak-bounded permutation and hence by the inductive hypothesis, the matching lemma is satisfied for P K inputs. x i I,U are thus assigned top/bottom subnetworks in a manner consistent with all other inputs. Matching inputs y i I,D can now be assigned the same subnetworks, followed by the remaining inputs in I, without conflict. Thus the conditions of the matching lemma are satisfied for any set of P inputs and permutation π. To complete the proof, we need to find an exact matching between inputs in I,D and I,U. First construct the compatability graph G on migrating inputs in I and I using only edges labeled. Clearly, G satisfies properties above. Thus, inputs in V with a cross edge have found a matching input in V for this stage. Now consider vertex pairs (x,π(x )),(x,π(x )) in V and (y,π(y )),(y,π(y )) inv, connected by straight edges labeled. Consider the path of the form S x,s π(x ),... in permutation graph Π. There are three possible cases: Case I: The path is of odd length and terminates in S π(y ) (or S π(y )). Case II: The path is of even length and terminates in S x. Case III: x = x. Figure illustrates these scenarios. If (I) is true, then x andy (ory ) are matching inputs and so arex andy (or y ). If (II) or (III) are true, then by symmetry the path in Π from S π(y ) onwards will also be of even length and terminate in S π(y ), unless π(y ) = π(y ), in which case

7 LSU-CSC-TR-, JUNE ST, Outputs Outputs 8 I I I y y x x I I I y y x x Destinations Matching Networks Band Exchange Networks Fig. Routing Networks KR-BENES PERMUTATION ROUTING (K =, N = ). 8 9 Case I Fig. FINDING MATCHING INPUTS IN Π. Case II the path will terminate immediately. In either case,x and x can be matched interchangeably withy and y. We now derive the main result in this paper: Theorem : For every migrating input in I i,d and I i,u, i N K, there exists a matching input ini i+,u and I i,d respectively. Proof: By the matching lemma, after application of the Benes control algorithm to the first stage of the KR-Benes, every migrating input in the top (bottom) subnetwork of each M i, has a matching migrating input in the corresponding subnetworks of M i and M i+. The top (bottom) subnetworks of eachm i stacked together are isomorphic to the top (bottom) subnetwork of an N N Benes network. Thus the inputs to these two subnetworks form a K/-bounded (and hence K-bounded) permutations. By an inductive argument, when the Benes control algorithm is applied to these permutations in this and succeeding stages, the matching lemma proves that every migrating input travels with a matched input to the same top/bottom subnetworks. Finally, at the end of log K stages, matched inputs will appear at exactly the same positions within each M i whence they can be exchanged by the Band-Exchange networks. Figure illustrates permutation routing within a KR-Benes for K =. Corollary : The proposed KR-Benes network is rearrangeable. A similar but more involved technique can be used to derive a noninductive proof of the matching lemma Matched inputs within each M i are exchanged by the Band-Exchange networks. At this point all migrating inputs are in the correct bands, at the exact positions they would be in if they had started out in that band. Continuing the Benes algorithm for the remaining log K stages therefore routes each input to its correct destination. A. Optimality Conjecture of the KR-Benes Network The depth of a switching network is the number of columns or stages of switching elements. We first show that any optimal rearrangeable network for K-bounded permutations must have a depth of at least logk +. Note that in our discussion on optimality, we only consider rearrangeable networks based on simple switching elements, similar to the Benes. We do not consider networks based on comparators or higher degree multiplexors and demultiplexors. Any optimal rearrangeable network must be able to route permutations containing the following subpermutations: ) π : π (j) = j + K, j I i, i.e, all inputs in a given band are directed to the lower band. ) π : π (j) = j K, j I i, i.e, all inputs in a given band are directed to the lower band. ) π : [ik,...,(i+)k ] [ik,...,(i+)k ] for a given input band I i. Thus π is an arbitrary permutation within a given band. Define an even band-exchange network as a column of switches for interchanging inputs j and j + K for all such inputs in even band pairs (I,I ),(I,I ),... Likewise define an odd band-exchange network for inputs in band pairs (I,I ),(I,I ),... An even band-exchange network implements π while an odd band-exchange network implementsπ. π can be implemented optimally by a K K Benes network. Moreover, none of these three

8 LSU-CSC-TR-, JUNE ST, 8 subnetworks can implement any of the other two subpermutations. Lemma : Any optimal rearrangeable network for K- bounded permutations requires at least log K + stages, K N. Proof: Any K-bounded permutation may contain one or more of the three permutations above as subpermutations. Therefore the optimal rearrangeable network must contain an even band-exchange stage, an odd bandexchange stage and a K K Benes network as subgraphs. Thus the depth of the optimal network is at least logk +. The proposed KR-Benes network has a depth of logk+, one more than the lower bound shown above. Since the Benes network in our lower bound scenario is a standard Benes, its middle two stages can be merged into one. Even though eachm i R i pair in a KR-Benes form a K K Benes network, it does not seem possible to merge the last stage of the M i network with the first stage of the R i network. Thus the number of stages in the KR-Benes is larger by one than the lower bound. However, we conjecture that the depth of the optimal network is actually log K +. Our arguments are as follows: Lemma : The optimal rearrangeable network has exactly two band-exchange networks. Proof: By symmetry, the optimal network must have an even number of band-exchange networks. Since two are necessary and four would increase the total number number of stages beyond the KR-Benes, there must be exactly two such stages in the optimal network. Lemma : The band-exchange networks must be preceded by at least logk stages in the optimal network. Proof: Let a and b be arbitrary and solitary migrating inputs in bands I i and I i+ such that π(a) I i+ and π(b) I i. Therefore they must be exchanged into their destination bands at some point. This implies that a and b must arrive at two (out of possibly many) prefixed outputs that are connected by exchange lines. Without loss of generality, we can assume that the prefixed outputs are in the same respective positions within each band (for example, j and j +K). A multistage interconnection network composed of switching elements can be viewed as a union of complete binary trees, with switching elements as nodes. From a given input in such a network, at most K/ outputs are reachable over logk stages. Since a and b are arbitrary inputs, they can appear in any of the K positions within their bands. Hence there exist a and b for which a mutually suitable output line (for exchange) is not simultaneously reachable in log K steps. Conjecture : There must be at least logk stages following the band-exchange stages in the optimal network. a b c d e f g h Output Permutation band exchange network Fig. EXAMPLE ILLUSTRATING THE OPTIMALITY CONJECTURE. Once matching inputs have been exchanged in the optimal network, we conjecture that there must be at least one input that is at a depth logk from its destination. For example, consider matching inputs c and f in Figure. In the figure they are exchanged at the nd and th outputs (the switching element marked cross in the middle stage). They can also be exchanged at any output i and i + by setting the switching elements differently. However, no matter which pair of output lines they are exchanged at, one of them requires two more stages to reach its destination. This is because they have destinations in adjacent switching elements but are exchanged at lines i and i+. Our conjecture seems to hold up well in practice, based on several small networks that we have examined. We believe it is possible to show that such inputs will always exist, however, we are looking for a formal proof. V. A NEW CONTROL-OPTIMAL REARRANGEABLE NETWORK The number of switching elements in the KR-Benes permutation network is N (logk + ) as compared to N (logn ) elements in an N N Benes. Thus the KR-Benes is preferable from the hardware point of view for values of K N. The sequential control complexity is N logk since N inputs have to be examined sequentially in each of the logk columns of the Matching and Routing networks. Note that the two shuffle-exchange stages are self-routing and hence simultaneously controlled. Only migratory inputs need to be switched and they can be marked apriori with a single bit tag. The control complexity of the standard Benes is N(logN ). Thus the KR-Benes has lower control complexity when K N. However, since K is a power of two, in practice, the KR-Benes will be preferable from the control point of view for K N. K-bounded permutation requests among the inputs to a switch reflect locality properties of traffic connections. In many cases, network sources may be constrained in their

9 LSU-CSC-TR-, JUNE ST, 9 ability to connect to various destinations by quality of service considerations such as delay or path length. Connection requests from such sources will not be arbitrary but very specific, for example, requests only to particular memory locations by specific processors in a multiprocessor shared-memory switching network, or requests by clients to specific servers for updates in a distributed system. These properties can be exploited by switches within the network by carefully assigning sources and destinations to input and output lines such that K-bounded permutations are formed. If the network traffic is known to exhibit these properties statically (i.e., the maximum value of K is bounded by N and does not increase with time), then a KR-Benes network can be used instead of the standard N N Benes with concommitant hardware and control complexity benefits. However, in most realistic cases, the value ofk among connection requests will change dynamically over time. A set of traffic connections with a given value of K may persist over a few time slots and be replaced by a new set with higher K. We would therefore like to design a permutation network that has the lowest control complexity for dynamically arriving traffic streams with varying values of K. The worst-case control complexity of such a network should be bounded by O(N logn), the control complexity of a standard Benes network. We now proceed to show that the KR-Benes can be easily modified to provide such a permutation-specific control-optimal network. Definition : Divide the set of N inputs inton/ pairs of adjacent inputs P i, i N. A Band Shuffle network consists of two consecutive columns of switching elements. The first column implements a -way perfect shuffle followed by a perfect unshuffle of input pairs P i and P i+, i N. The second column performs the same action on input pairs P i+ and P i+, i N. Consider an N N Benes network. Number the columns of the network from left to right from to logn. Insert a Band Shuffle network immediately at the output of stage i, i logn. Attach bypass edges leading from the outputs of i th Band Shuffle network to the inputs of switching elements in stage logn i. Also attach bypass edges between stages containing a Band Shuffle network, that allow the Band Shuffle network to be bypassed. The network just described above is our control-optimal rearrangeable network (CORN). Figure 8 illustrates a 8 8 CORN. Theorem : The control complexity of an N N control-optimal rearrangeable network is Band Shuffle Network(BSN) Bypass Lines Fig. 8 BSN 8 8 CORN. NOT ALL BYPASS LINES ARE SHOWN. min(n logk,n logn N) for an arbitrary permutation π on N inputs, where K = max( π(i) i ), i N (K is rounded up to the nearest power of two). Proof: The proof relies on showing that the CORN contains every KR-Benes network as a subgraph, for K N. By selecting the appropriate bypass links based on the value of K derived from the inputs, the CORN simulates a KR-Benes network. For example, a KR-Benes with K = can be simulated by bypassing the first Band Shuffle network, passing through the second Band Shuffle and then bypassing the third stage. Thus the control complexity of the CORN is the same as that of of the corresponding KR-Benes plus the small overhead required to set the bypass links (which can be made self-routing). For a givenk, the firstlogk stages of the CORN (with the first logk Band Shuffle networks bypassed), are isomorphic to the Matching network stage of a KR-Benes. Similarly, the last logk stages of the CORN are isomorphic to the Routing network stage of a KR-Benes. The log Kth Band Shuffle network in the CORN therefore implements the band-exchange stage of the KR-Benes. Following the bypass links at the output of the Band Shuffle network to the (logn logk)th stage of the CORN leads to the Routing network of the KR-Benes. Hence routing in the corn is identical to routing in the corresponding KR-Benes network. Note that an alternate version of the CORN can be derived by using a single Band-Shuffle network to which outputs from various stages of then N Benes are multiplexed. However this will require the use of logk : Multiplexors and Demultiplexors at each input and output of the Band Shuffle network. The utility of either solution depends on the cost of implementation [] and is not discussed here. VI. CONCLUSION This paper demonstrates the power and elegance of the Benes for rearrangeably routing permutations. By

10 LSU-CSC-TR-, JUNE ST, making small modifications to the Benes in order to exploit the locality property of permutations (also called K-boundedness), we have designed a new network that is permutation-specific control-optimal. Its control complexity is superior to the Benes in most cases and bounded by the Benes in the worst case. The KR-Benes can be efficiently used for static traffic scenarios when K N/ while the CORN network can be used for arbitrary permutations. Several implementations of the CORN are possible which we have not discussed in this paper. While our conjecture on the optimal depth oflogk+ fork-bounded rearrangeable networks seems to hold up well in practice, we are looking for a formal proof. Another interesting question is whether there are there alternative techniques by which the complexity can be improved. REFERENCES [] V. E. Benes, Optimal Rearrangeable Multistage Connecting Networks, Bell System Technical Journal, (9), pp. -. [] S-T. Chuang, A. Goel, N. McKeown and B. Prabhakar, Matching Output Queueing with a Combined Input Output Queued Switch, IEEE INFOCOM 999, pp. 9-8, April 999. [] J. Duato, S. Yalamanchili and L. Ni, Interconnection Networks, IEEE Computer Society Press, Los Alamitos, CA., 99. [] R. Kannan and S. Ray, Sorting Networks with Applications to Hierarchical Optical Interconnects, Intnl. COnf. on Parallel processing Workshop on Optical Networks, pp. -, Taiwan, October. [] R. Kannan, Rearrangeable Switching Network Architecture, U.S Patent Application pending. [] D. Nassimi and S. Sahni, Parallel Algorithms to Set Up the Benes Permutation Network, IEEE Transactions on Computers, (): 8- (98). [] A. Pattavina and G. Maier, Photonic Rearrangeable Networks with Zero Switching-Element Crosstalk, IEEE INFOCOM 999, pp. -, April 999. [8] Y. Yang, J. Wang and Y. Pan, Permutation Capability of Optical Multistage Interconnection Networks, J. of Parallel and Dist. Computing, Vol., No., pp. -9, Jan..

Crossbar - example. Crossbar. Crossbar. Combination: Time-space switching. Simple space-division switch Crosspoints can be turned on or off

Crossbar - example. Crossbar. Crossbar. Combination: Time-space switching. Simple space-division switch Crosspoints can be turned on or off Crossbar Crossbar - example Simple space-division switch Crosspoints can be turned on or off i n p u t s sessions: (,) (,) (,) (,) outputs Crossbar Advantages: simple to implement simple control flexible

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Literature Survey of nonblocking network topologies

Literature Survey of nonblocking network topologies Literature Survey of nonblocking network topologies S.UMARANI 1, S.PAVAI MADHESWARI 2, N.NAGARAJAN 3 Department of Computer Applications 1 Department of Computer Science and Engineering 2,3 Sakthi Mariamman

More information

Switch Fabrics. Switching Technology S P. Raatikainen Switching Technology / 2006.

Switch Fabrics. Switching Technology S P. Raatikainen Switching Technology / 2006. Switch Fabrics Switching Technology S38.3165 http://www.netlab.hut.fi/opetus/s383165 L4-1 Switch fabrics Basic concepts Time and space switching Two stage switches Three stage switches Cost criteria Multi-stage

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Switch Fabrics. Switching Technology S Recursive factoring of a strict-sense non-blocking network

Switch Fabrics. Switching Technology S Recursive factoring of a strict-sense non-blocking network Switch Fabrics Switching Technology S38.65 http://www.netlab.hut.fi/opetus/s3865 5 - Recursive factoring of a strict-sense non-blocking network A strict-sense non-blocking network can be constructed recursively,

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Distributed Sorting. Chapter Array & Mesh

Distributed Sorting. Chapter Array & Mesh Chapter 9 Distributed Sorting Indeed, I believe that virtually every important aspect of programming arises somewhere in the context of sorting [and searching]! Donald E. Knuth, The Art of Computer Programming

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Fundamental Complexity of Optical Systems

Fundamental Complexity of Optical Systems Fundamental Complexity of Optical Systems Hadas Kogan, Isaac Keslassy Department of Electrical Engineering echnion - Israel Institute of echnology Haifa 32000, Israel {rhadas@tx,isaac@ee}.technion.ac.il

More information

Advanced Combinatorial Optimization September 17, Lecture 3. Sketch some results regarding ear-decompositions and factor-critical graphs.

Advanced Combinatorial Optimization September 17, Lecture 3. Sketch some results regarding ear-decompositions and factor-critical graphs. 18.438 Advanced Combinatorial Optimization September 17, 2009 Lecturer: Michel X. Goemans Lecture 3 Scribe: Aleksander Madry ( Based on notes by Robert Kleinberg and Dan Stratila.) In this lecture, we

More information

Throughout this course, we use the terms vertex and node interchangeably.

Throughout this course, we use the terms vertex and node interchangeably. Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring

More information

Lectures 8/9. 1 Overview. 2 Prelude:Routing on the Grid. 3 A couple of networks.

Lectures 8/9. 1 Overview. 2 Prelude:Routing on the Grid. 3 A couple of networks. U.C. Berkeley CS273: Parallel and Distributed Theory Lectures 8/9 Professor Satish Rao September 23,2010 Lecturer: Satish Rao Last revised October 23, 2010 Lectures 8/9 1 Overview We will give a couple

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)

More information

Fundamental Properties of Graphs

Fundamental Properties of Graphs Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

3 Fractional Ramsey Numbers

3 Fractional Ramsey Numbers 27 3 Fractional Ramsey Numbers Since the definition of Ramsey numbers makes use of the clique number of graphs, we may define fractional Ramsey numbers simply by substituting fractional clique number into

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

Computation with No Memory, and Rearrangeable Multicast Networks

Computation with No Memory, and Rearrangeable Multicast Networks Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:1, 2014, 121 142 Computation with No Memory, and Rearrangeable Multicast Networks Serge Burckel 1 Emeric Gioan 2 Emmanuel Thomé 3 1 ERMIT,

More information

Vertex Deletion games with Parity rules

Vertex Deletion games with Parity rules Vertex Deletion games with Parity rules Richard J. Nowakowski 1 Department of Mathematics, Dalhousie University, Halifax, Nova Scotia, Canada rjn@mathstat.dal.ca Paul Ottaway Department of Mathematics,

More information

arxiv: v1 [math.co] 7 Dec 2018

arxiv: v1 [math.co] 7 Dec 2018 SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential

More information

14 More Graphs: Euler Tours and Hamilton Cycles

14 More Graphs: Euler Tours and Hamilton Cycles 14 More Graphs: Euler Tours and Hamilton Cycles 14.1 Degrees The degree of a vertex is the number of edges coming out of it. The following is sometimes called the First Theorem of Graph Theory : Lemma

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

Space vs Time, Cache vs Main Memory

Space vs Time, Cache vs Main Memory Space vs Time, Cache vs Main Memory Marc Moreno Maza University of Western Ontario, London, Ontario (Canada) CS 4435 - CS 9624 (Moreno Maza) Space vs Time, Cache vs Main Memory CS 4435 - CS 9624 1 / 49

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Figure 4.1: The evolution of a rooted tree.

Figure 4.1: The evolution of a rooted tree. 106 CHAPTER 4. INDUCTION, RECURSION AND RECURRENCES 4.6 Rooted Trees 4.6.1 The idea of a rooted tree We talked about how a tree diagram helps us visualize merge sort or other divide and conquer algorithms.

More information

1 Minimum Cut Problem

1 Minimum Cut Problem CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum

More information

Vertex Magic Total Labelings of Complete Graphs 1

Vertex Magic Total Labelings of Complete Graphs 1 Vertex Magic Total Labelings of Complete Graphs 1 Krishnappa. H. K. and Kishore Kothapalli and V. Ch. Venkaiah Centre for Security, Theory, and Algorithmic Research International Institute of Information

More information

arxiv: v3 [cs.dm] 12 Jun 2014

arxiv: v3 [cs.dm] 12 Jun 2014 On Maximum Differential Coloring of Planar Graphs M. A. Bekos 1, M. Kaufmann 1, S. Kobourov, S. Veeramoni 1 Wilhelm-Schickard-Institut für Informatik - Universität Tübingen, Germany Department of Computer

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Dartmouth Computer Science Technical Report TR Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph

Dartmouth Computer Science Technical Report TR Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph Dartmouth Computer Science Technical Report TR2014-753 Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph Stefanie Ostrowski May 28, 2014 Abstract We consider the

More information

(Refer Slide Time: 0:19)

(Refer Slide Time: 0:19) Theory of Computation. Professor somenath Biswas. Department of Computer Science & Engineering. Indian Institute of Technology, Kanpur. Lecture-15. Decision Problems for Regular Languages. (Refer Slide

More information

Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

More information

Fast and Simple Algorithms for Weighted Perfect Matching

Fast and Simple Algorithms for Weighted Perfect Matching Fast and Simple Algorithms for Weighted Perfect Matching Mirjam Wattenhofer, Roger Wattenhofer {mirjam.wattenhofer,wattenhofer}@inf.ethz.ch, Department of Computer Science, ETH Zurich, Switzerland Abstract

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Ma/CS 6b Class 5: Graph Connectivity

Ma/CS 6b Class 5: Graph Connectivity Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should

More information

Scalable Schedulers for High-Performance Switches

Scalable Schedulers for High-Performance Switches Scalable Schedulers for High-Performance Switches Chuanjun Li and S Q Zheng Mei Yang Department of Computer Science Department of Computer Science University of Texas at Dallas Columbus State University

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3) COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Florent R. Madelaine and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road,

More information

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H. Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph

More information

On k-dimensional Balanced Binary Trees*

On k-dimensional Balanced Binary Trees* journal of computer and system sciences 52, 328348 (1996) article no. 0025 On k-dimensional Balanced Binary Trees* Vijay K. Vaishnavi Department of Computer Information Systems, Georgia State University,

More information

Extremal Graph Theory: Turán s Theorem

Extremal Graph Theory: Turán s Theorem Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-9-07 Extremal Graph Theory: Turán s Theorem Vincent Vascimini

More information

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue

More information

Vertex Magic Total Labelings of Complete Graphs

Vertex Magic Total Labelings of Complete Graphs AKCE J. Graphs. Combin., 6, No. 1 (2009), pp. 143-154 Vertex Magic Total Labelings of Complete Graphs H. K. Krishnappa, Kishore Kothapalli and V. Ch. Venkaiah Center for Security, Theory, and Algorithmic

More information

Recognizing Interval Bigraphs by Forbidden Patterns

Recognizing Interval Bigraphs by Forbidden Patterns Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007 CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

More information

arxiv: v2 [cs.ds] 18 May 2015

arxiv: v2 [cs.ds] 18 May 2015 Optimal Shuffle Code with Permutation Instructions Sebastian Buchwald, Manuel Mohr, and Ignaz Rutter Karlsruhe Institute of Technology {sebastian.buchwald, manuel.mohr, rutter}@kit.edu arxiv:1504.07073v2

More information

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

Lecture 3: Art Gallery Problems and Polygon Triangulation

Lecture 3: Art Gallery Problems and Polygon Triangulation EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified

More information

Bar k-visibility Graphs

Bar k-visibility Graphs Bar k-visibility Graphs Alice M. Dean Department of Mathematics Skidmore College adean@skidmore.edu William Evans Department of Computer Science University of British Columbia will@cs.ubc.ca Ellen Gethner

More information

Abstract Path Planning for Multiple Robots: An Empirical Study

Abstract Path Planning for Multiple Robots: An Empirical Study Abstract Path Planning for Multiple Robots: An Empirical Study Charles University in Prague Faculty of Mathematics and Physics Department of Theoretical Computer Science and Mathematical Logic Malostranské

More information

arxiv: v5 [cs.dm] 9 May 2016

arxiv: v5 [cs.dm] 9 May 2016 Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph

More information

Basics of Graph Theory

Basics of Graph Theory Basics of Graph Theory 1 Basic notions A simple graph G = (V, E) consists of V, a nonempty set of vertices, and E, a set of unordered pairs of distinct elements of V called edges. Simple graphs have their

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Some Upper Bounds for Signed Star Domination Number of Graphs. S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour.

Some Upper Bounds for Signed Star Domination Number of Graphs. S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour. Some Upper Bounds for Signed Star Domination Number of Graphs S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour Abstract Let G be a graph with the vertex set V (G) and edge set E(G). A function

More information

The self-minor conjecture for infinite trees

The self-minor conjecture for infinite trees The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper

More information

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4) S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G

More information

Hypercube orientations with only two in-degrees

Hypercube orientations with only two in-degrees Hypercube orientations with only two in-degrees Joe Buhler Steve Butler Ron Graham Eric Tressler Abstract We consider the problem of orienting the edges of the n-dimensional hypercube so only two different

More information

Cache-Oblivious Traversals of an Array s Pairs

Cache-Oblivious Traversals of an Array s Pairs Cache-Oblivious Traversals of an Array s Pairs Tobias Johnson May 7, 2007 Abstract Cache-obliviousness is a concept first introduced by Frigo et al. in [1]. We follow their model and develop a cache-oblivious

More information

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles SIAM J. COMPUT. Vol. 0, No. 0, pp. 000 000 c XXXX Society for Industrial and Applied Mathematics REVISITING TUCKER S ALGORITHM TO COLOR CIRCULAR ARC GRAPHS MARIO VALENCIA-PABON Abstract. The circular arc

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Computer Science 236 Fall Nov. 11, 2010

Computer Science 236 Fall Nov. 11, 2010 Computer Science 26 Fall Nov 11, 2010 St George Campus University of Toronto Assignment Due Date: 2nd December, 2010 1 (10 marks) Assume that you are given a file of arbitrary length that contains student

More information

Direct Routing: Algorithms and Complexity

Direct Routing: Algorithms and Complexity Direct Routing: Algorithms and Complexity Costas Busch, RPI Malik Magdon-Ismail, RPI Marios Mavronicolas, Univ. Cyprus Paul Spirakis, Univ. Patras 1 Outline 1. Direct Routing. 2. Direct Routing is Hard.

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

Eulerian disjoint paths problem in grid graphs is NP-complete

Eulerian disjoint paths problem in grid graphs is NP-complete Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Efficient Bufferless Packet Switching on Trees and Leveled Networks

Efficient Bufferless Packet Switching on Trees and Leveled Networks Efficient Bufferless Packet Switching on Trees and Leveled Networks Costas Busch Malik Magdon-Ismail Marios Mavronicolas Abstract In bufferless networks the packets cannot be buffered while they are in

More information

On Sequential Topogenic Graphs

On Sequential Topogenic Graphs Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 36, 1799-1805 On Sequential Topogenic Graphs Bindhu K. Thomas, K. A. Germina and Jisha Elizabath Joy Research Center & PG Department of Mathematics Mary

More information

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES)

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Chapter 1 A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Piotr Berman Department of Computer Science & Engineering Pennsylvania

More information

Grey Codes in Black and White

Grey Codes in Black and White Grey Codes in Black and White Wes Cleveland, Erin Connerley, Becca Maddrell, Kasey Aderhold, Abel Yehdego December 8, 2007 Introduction A Gray code represents each number in the sequence of integers 0,,...,

More information

Cost-Effective Traffic Grooming in WDM Rings

Cost-Effective Traffic Grooming in WDM Rings 618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,

More information

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Arnaud Labourel a a LaBRI - Universite Bordeaux 1, France Abstract In 1974, Kundu [4] has shown that triangulated

More information

A Fast Parallel Routing Algorithm for Benes Group Switches

A Fast Parallel Routing Algorithm for Benes Group Switches A Fast Parallel Routing Algorithm for Benes Group Switches Enyue Lu and S Q Zheng Department of Computer Science University of Texas at Dallas Richardson, TX -, USA enyue, sizheng @utdallasedu ABSTRACT

More information

EXTERNAL VISIBILITY. 1. Definitions and notation. The boundary and interior of

EXTERNAL VISIBILITY. 1. Definitions and notation. The boundary and interior of PACIFIC JOURNAL OF MATHEMATICS Vol. 64, No. 2, 1976 EXTERNAL VISIBILITY EDWIN BUCHMAN AND F. A. VALENTINE It is possible to see any eleven vertices of an opaque solid regular icosahedron from some appropriate

More information

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Wei Shi and Pradip K Srimani Department of Computer Science Colorado State University Ft. Collins, CO 80523 Abstract Bounded degree

More information

Elements of Graph Theory

Elements of Graph Theory Elements of Graph Theory Quick review of Chapters 9.1 9.5, 9.7 (studied in Mt1348/2008) = all basic concepts must be known New topics we will mostly skip shortest paths (Chapter 9.6), as that was covered

More information

An Efficient Algorithm for Computing Non-overlapping Inversion and Transposition Distance

An Efficient Algorithm for Computing Non-overlapping Inversion and Transposition Distance An Efficient Algorithm for Computing Non-overlapping Inversion and Transposition Distance Toan Thang Ta, Cheng-Yao Lin and Chin Lung Lu Department of Computer Science National Tsing Hua University, Hsinchu

More information