for Information Gathering with Adversarial Traffic Stefan Dobrev, - - PowerPoint PPT Presentation

for information gathering
SMART_READER_LITE
LIVE PREVIEW

for Information Gathering with Adversarial Traffic Stefan Dobrev, - - PowerPoint PPT Presentation

Optimal Local Buffer Management for Information Gathering with Adversarial Traffic Stefan Dobrev, Slovak Academy of Sciences, Slovakia Manuel Lafond, University of Ottawa, Canada Lata Narayanan, Concordia University, Canada Jaroslav Opatrny,


slide-1
SLIDE 1

Optimal Local Buffer Management for Information Gathering with Adversarial Traffic

Stefan Dobrev, Slovak Academy of Sciences, Slovakia Manuel Lafond, University of Ottawa, Canada Lata Narayanan, Concordia University, Canada Jaroslav Opatrny, Concordia University, Canada

slide-2
SLIDE 2
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 2

Network has a special node s called the sink. Packets enter the network at discrete time steps. Each packet generated by the network is destined for the sink. Our networks are all trees directed towards s.

s

slide-3
SLIDE 3
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 3

Each arc has capacity c. Adversary can inject packets at a rate of c. Goal: fill up node buffers as much as possible. Locality constraints: each node can only see the state of the nodes at (undirected) distance at most l.

s

slide-4
SLIDE 4
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 4

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward.

s

slide-5
SLIDE 5
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 5

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s a Step 1

slide-6
SLIDE 6
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 6

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-7
SLIDE 7
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 7

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s a Step 1

slide-8
SLIDE 8
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 8

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-9
SLIDE 9
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 9

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 1 a

slide-10
SLIDE 10
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 10

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-11
SLIDE 11
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 11

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 1 a

slide-12
SLIDE 12
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 12

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-13
SLIDE 13
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 13

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 1 a

slide-14
SLIDE 14
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 14

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-15
SLIDE 15
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 15

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 1 a

slide-16
SLIDE 16
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 16

2 mini-steps model: each round has 2 steps Step 1: adversary injects up to c packets into the network. Step 2: each node sends up to c packets forward. Example with c = 1 (always send policy)

s Step 2

slide-17
SLIDE 17
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Information gathering with adversary

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 17

Node buffer has size 3. Could we have done better, using another policy? What buffer size is sufficient against any adversarial strategy?

Depends on policy. So, which policy requires minimum buffer size?

s Step 2

slide-18
SLIDE 18
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Related work

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 18

Adversarial queueing theory introduced in [Borodin et al., 2001]

Each packet can have its own destination + forced route. Stability of a policy: are buffer sizes bounded by some f(n) for all input streams? Greedy policies are stable for all DAGs when c = 1. There exist universally stable policies (stable on any network) when c = 1 [Andrews et al., 2001] (though f(n) can be exponential in n).

slide-19
SLIDE 19
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Related work

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 19

Adversarial queueing theory introduced in [Borodin et al., 2001]

Each packet can have its own destination + forced route. Stability of a policy: are buffer sizes bounded by some f(n) for all input streams? Greedy policies are stable for all DAGs when c = 1. There exist universally stable policies (stable on any network) when c = 1 [Andrews et al., 2001] (though f(n) can be exponential in n).

Competitive Network Throughput model [Aiello et al., 2003]

Buffer sizes are fixed to some constant B. Goal: minimize number of dropped packets. For B = 1, any online deterministic algorithm is Ω(n)-competitive. For B > 1, O( 𝑜)-competitiveness can be achieved.

slide-20
SLIDE 20
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Related work

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 21

Maximum buffer size for information gathering studied in [Kothapalli and Scheideler, 2003] on undirected paths

More powerful adversary that turns edges on/off each round. Θ(log n)-competitiveness upper/lower bound.

slide-21
SLIDE 21
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Related work

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 22

Maximum buffer size for information gathering studied in [Kothapalli and Scheideler, 2003] on undirected paths

More powerful adversary that turns edges on/off each round. Θ(log n)-competitiveness upper/lower bound.

Maximum buffer size on directed paths (our setting) [Miller and Patt-Shamir, DISC 2016]

With no locality constraints (every node can see the whole network), O(c) buffer size is sufficient. With locality constraints:

  • “Always send” requires Θ(n) buffer size.
  • “Forward iff successor empty” requires Θ(r) packets after r rounds.
  • “Local downhill”, which forwards iff successor has strictly less packets in

its buffer, requires Θ(n) buffer size.

slide-22
SLIDE 22
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Our results

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 23

Information gathering on directed paths and trees with locality l and injection rate c

Ω(c log n/l) lower bound on required buffer sizes

  • more precisely c(1 + (log n – 2 log l)/(2l))

Asymptotic lower bound also holds for undirected paths For c = 1 and l = 1, upper bound of O(log n) on directed paths

  • More precisely log n + 3 upper bound

For c = 1 and l = 2, upper bound of O(log n) on trees

slide-23
SLIDE 23
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Our results

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 24

Information gathering on directed paths and trees with locality l and injection rate c

Ω(c log n/l) lower bound on required buffer sizes

  • more precisely c(1 + (log n – 2 log l)/(2l))

Asymptotic lower bound also holds for undirected paths For c = 1 and l = 1, upper bound of O(log n) on directed paths

  • More precisely log n + 3 upper bound

For c = 1 and l = 2, upper bound of O(log n) on trees

Patt-Shamir and Rosenbaum present essentially the same results in their PODC 2017 paper (!)

Same algorithms, different analysis Stronger bounds of O(log diam(G)) for trees

slide-24
SLIDE 24
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 25

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

slide-25
SLIDE 25
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 26

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

(path on n nodes)

slide-26
SLIDE 26
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 27

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

(path on n nodes) a

  • 1. Adversary successively injects n packets at the tail. No packet has time to

get to the sink => The packet density becomes d = #packets / #nodes = n/n = 1

slide-27
SLIDE 27
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 28

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

(path on n nodes) a

  • 1. Adversary successively injects n packets at the tail. No packet has time to

get to the sink => The packet density becomes d = #packets / #nodes = n/n = 1

  • 2. Next, adversary successively injects at the head. The head can never empty

its buffer. At some point, every node (except the head) will stop sending forward.

slide-28
SLIDE 28
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 29

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

  • 3. The next step is to obtain an interval of n/2 nodes with density 1 + ½.

If right half already has this density, we are done. If not, the left half must have density at least ½. n/2 n/2

slide-29
SLIDE 29
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 30

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

  • 3. The next step is to obtain an interval of n/2 nodes with density 1 + ½.

If right half already has this density, we are done. If not, the left half must have density at least ½.

  • 4. In this case, adversary injects n/2 packets at the tail. Recall that every node

has stopped sending forward until something changes. The last node of the left half won’t catch on until n/2 injections. The density of the left half becomes at least ½ + 1. n/2 n/2 a Density ½ + n/2 packets => density 1 + ½

slide-30
SLIDE 30
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Lower bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 31

How can adversary enforce O(log n) buffer size on at least one node?

Rough idea for c = 1, l = 1

  • 5. Adversary can repeat this procedure on the 1 + ½ interval. This can

be applied up to log n times, after which the density is 1 + ½ log n, implying that some node has at least this buffer size.

slide-31
SLIDE 31
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 32

How can we ensure that buffer size O(log n) is enough?

c = 1, l = 1

Simple algorithm for a node v with successor v’:

If v currently has odd buffer size, send to v’ iff bufsize(v) ≥ bufsize(v’) If v currently has even buffer size, send to v’ iff bufsize(v) > bufsize(v’)

Claim: if every node runs this algorithm, O(log n) buffer size is enough.

slide-32
SLIDE 32
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 33

Example of before and after step 2

If v currently has odd buffer size, send to v’ iff bufsize(v) ≥ bufsize(v’) If v currently has even buffer size, send to v’ iff bufsize(v) > bufsize(v’)

1 1 2 2 2 1 2 2 2 1 1 Will send Won’t send Will send

slide-33
SLIDE 33
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/24/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 34

Simple algorithm for a node v with successor v’:

If v currently has odd buffer size, send to v’ iff bufsize(v) ≥ bufsize(v’) If v currently has even buffer size, send to v’ iff bufsize(v) > bufsize(v’)

Claim: if every node runs this algorithm, O(log n) buffer size is enough. Intuition: if only “send when ≥” is applied, packets accumulate in the front on the path. If only “send when >” is applied, packets accumulate in the back of the path. Alternating between the two policies spreads out packets in the middle.

slide-34
SLIDE 34
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 35

Order the packets p1, p2, …, pk of a node v arbitrarily (at end of round) Call h(v) = k the height of v (i.e. its number of packets) Idea: for i ≥ 3, for packet pi to exist, there must be nodes u1, u2, …, uk-2 of heights 1,2,…,i – 2, respectively. “Attach” each packet pi to nodes u1, u2, …, ui-2

2 2 3 1 1 Packet p3

slide-35
SLIDE 35
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 36

Idea: for i ≥ 3, for the i-th packet to exist, there must be nodes u1, u2, …, uk-2 of heights 1,2,…,i – 2, respectively. “Attach” each i-th packet to nodes u1, u2, …, ui-2

slide-36
SLIDE 36
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 37

Attachment scheme:

For every node v, each of its packets pi is attached to nodes of height 1,2,…,i-2 (for every i ≥ 3) No two nodes are attached to the same packet.

Lemma: if the even-odd algorithm is used, at the end of every round, there exists an attachment scheme.

Proof idea: oh jeez…

Theorem: the maximum size of a buffer is log n + 3

Proof idea: counting argument using attachment scheme. If a node has a packet plog n + 4, this implies the existence of distinct attached nodes of height log n + 2, log n + 1, …, 1. Plus the nodes attached to plog n + 3, to plog n + 2, etc. Plus the nodes attached to these attached nodes, and so on. By counting appropriately, we end up with > n nodes, a contradiction.

slide-37
SLIDE 37
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 38

Attachment scheme:

For every node v, each of its packets pi is attached to nodes of height 1,2,…,i-2 (for every i ≥ 3) No two nodes are attached to the same packet.

Lemma: if the even-odd algorithm is used, at the end of every round, there exists an attachment scheme.

Proof idea: oh jeez… How do we prove this?!

slide-38
SLIDE 38
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 39

Attachment scheme:

For every node v, each of its packets pi is attached to nodes of height 1,2,…,i-2 (for every i ≥ 3) No two nodes are attached to the same packet.

Lemma: if the even-odd algorithm is used, at the end of every round, there exists an attachment scheme.

Proof idea: oh jeez… How do we prove this?! Induction on the number of rounds. True at round 0 when every node has height 0.

slide-39
SLIDE 39
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Upper bound on directed path

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 40

Lemma: if the even-odd algorithm is used, at the end of every round, there exists an attachment scheme.

Proof idea: oh jeez… How do we prove this?! Induction on the number of rounds. True at round 0 when every node has height 0. For the induction step, start the round with a valid attachment scheme. Process the round, retain attachments that are still valid. Some node have gained height (“up nodes”) and must find attachments. Some nodes have lost height (“down nodes”) and have attachments to give. Match each up node with a distinct down node, and pass unused attachments.

slide-40
SLIDE 40
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 41

Example of before-step-1, after-step-1, after-step-2

1 1 2 2 2 1 1 1 3 2 2 1 2 2 3 1 1

slide-41
SLIDE 41
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 42

After each round of two mini-steps, each node has either -1, +1, +2

  • r +0 buffer size.

1 1 2 2 2 1 1 1 3 2 2 1 2 2 3 1 1

  • 1

+1 +0 +1

  • 1

+0

slide-42
SLIDE 42
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 43

After each round of two mini-steps, each node has either -1, +1, +2

  • r +0 buffer size.

Focus on the +1 and -1 nodes. (to simplify things, assume no +2)

+1

  • 1
  • 1

+1 +1

  • 1

+1

  • 1
slide-43
SLIDE 43
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 44

After each round of two mini-steps, each node has either -1, +1, +2

  • r +0 buffer size.

Focus on the +1 and -1 nodes. (to simplify things, assume no +2) Make +1/-1 node pairs by traversing from left to right, matching the unmatched nodes encountered with their nearest right neighbor.

+1

  • 1
  • 1

+1 +1

  • 1

+1

  • 1
slide-44
SLIDE 44
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 45

After each round of two mini-steps, each node has either -1, +1, +2

  • r +0 buffer size.

Focus on the +1 and -1 nodes. (to simplify things, assume no +2) Make +1/-1 node pairs by traversing from left to right, matching the unmatched nodes encountered with their nearest right neighbor. Lemma: every matched pair has a +1 and a -1.

+1

  • 1
  • 1

+1 +1

  • 1

+1

  • 1
slide-45
SLIDE 45
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 46

For example…

1 1 2 2 2 1 1 1 3 2 2 1 2 2 3 1 1

  • 1

+1 +0 +1

  • 1

+0

slide-46
SLIDE 46
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Handling a -1/+1 pair

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 47

3 5 5 5 5 6 Before round 3 4 5 5 6 6 After round

slide-47
SLIDE 47
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Handling a -1/+1 pair

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 48

3 5 5 5 5 6 Before round 3 4 5 5 6 6 After round

slide-48
SLIDE 48
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Handling a -1/+1 pair

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 49

3 5 5 5 5 6 Before round 3 4 5 5 6 6 After round Needs attachments Unused attachments

slide-49
SLIDE 49
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Handling a -1/+1 pair

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 50

3 5 5 5 5 6 Before round 3 4 5 5 6 6 After round Needs attachments Unused attachments

slide-50
SLIDE 50
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Handling a -1/+1 pair

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 51

3 5 5 5 5 6 Before round 3 4 5 5 6 6 After round Needs attachments Unused attachments

slide-51
SLIDE 51
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Up nodes and down nodes

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 52

Process each +1/-1 subpath independently. After each has been handled, we have obtained a valid attachment scheme. Many, many subcases and annoying details to handle in the attachments passing (e.g. +2 nodes). The odd-even algorithm is needed for this proof to work – in some special cases of attachment passing.

Unfortunately, too technical to describe here. Sorry!

+1

  • 1
  • 1

+1 +1

  • 1

+1

  • 1
slide-52
SLIDE 52
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Algorithm on trees

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 53

Slight modification of the odd-even algorithm required on trees. For nodes of indegree > 1, give priority to the highest node. Apply the same odd-even algorithm on the nodes that have priority.

… 6 4 5 5

slide-53
SLIDE 53
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Algorithm on trees

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 54

… 6 4 5 5 Send Don’t send

Slight modification of the odd-even algorithm required on trees. For nodes of indegree > 1, give priority to the highest node. Apply the same odd-even algorithm on the nodes that have priority.

slide-54
SLIDE 54
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Algorithm on trees

7/23/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 55

Locality 2 is needed to determine who has priority.

With locality 1 on trees, 𝑜 buffer size lower bound.

Our algorithm partitions the tree into priority paths. The path analysis can be applied to each path individually.

Just more cases to handle.

slide-55
SLIDE 55
  • S. Dobrev, M. Lafond, L. Narayanan, J. Opatrny

Conclusion

7/25/2017 Optimal Local Buffer Management for Information Gathering with Adversarial Traffic 56

We have shown a Ω(log n) lower bound + matching O(log n) lower bound for paths when c=1, l=1 + trees when l=2.

What about c > 1 ? See Patt-Shamir & Rosenbaum paper.

What of non-uniform edge capacities? We only cared about the node with highest buffer size. But adversary can’t make every buffer of size log n. Alternative criterion for space requirements? What if we allow randomization…

In the node algorithms? In the packet injection model (instead of an adversary)?

Competitiveness of information gathering in general DAGs?