Permutation Routing over Sparse Networks Presented by Nithish Kumar - - PowerPoint PPT Presentation

β–Ά
permutation routing over sparse networks
SMART_READER_LITE
LIVE PREVIEW

Permutation Routing over Sparse Networks Presented by Nithish Kumar - - PowerPoint PPT Presentation

Permutation Routing over Sparse Networks Presented by Nithish Kumar and Shubhang Kulkarni Presenter: Nithish Kumar Routing Algorithm Given a network topology, a routing algorithm specifies, for each pair of nodes, a route - or a sequence of


slide-1
SLIDE 1

Permutation Routing over Sparse Networks

Nithish Kumar and Shubhang Kulkarni Presented by

slide-2
SLIDE 2

Presenter: Nithish Kumar

slide-3
SLIDE 3

Routing Algorithm

  • Given a network topology, a routing algorithm specifies, for each pair of nodes, a

route - or a sequence of edges - connecting the pair in the network.

  • The algorithm may also specify a queuing policy for ordering packets in the

switches' queues. For example. the First In First Out (FIFO) policy orders packets by their order of arrival. The Furthest To Go (FTG) policy orders packets in decreasing order of the number of edges they must stiII cross in the network.

slide-4
SLIDE 4

The Model

  • We model a communication network by a directed graph on N nodes.

Each node is a routing switch. A directed edge models a communication channel, which connects two adjacent routing switches.

  • We consider a synchronous computing model in which

(a) an edge can carry one packet in each time step and (b) a packet can traverse no more than one edge per step.

slide-5
SLIDE 5

The Model

  • We assume that switches have buffers or queues to store packets

waiting for transmission through each of the switch's outgoing edges.

  • The measure of the performance of a routing algorithm on a given

network topology is the maximum time - measured as the number of parallel steps - required to route an arbitrary permutation routing problem.

slide-6
SLIDE 6

The Permutation Routing Problem

  • In the permutation routing problem
  • each node sends exactly one packet
  • each node is the address of exactly one packet.
  • If the graph is complete, routing the permutation can be done in just
  • ne step.
  • But most graphs are sparse and packet routing on such networks
  • ften leads to congestion and bottlenecks.
slide-7
SLIDE 7

Hypercubes

The n-dimensional hypercube (or n-cube) is a network with N = 2n nodes such that node X has a direct connection to node Y if and only if X and Y differ in exactly one bit.

slide-8
SLIDE 8

Hypercubes

slide-9
SLIDE 9

Permutation Routing in Hypercubes

  • We analyse a hypercube with N processors and O(N log N) edges.
  • The total number of directed edges in the n-cube is 2nN. since each

node is adjacent to n outgoing and n ingoing edges.

  • The diameter of the network is n; that is, there is a directed path of

length up to n connecting any two nodes in the network, and there are pairs of nodes that are not connected by any shorter path(for instance take 00..0 and 11...1).

slide-10
SLIDE 10

Bit-Fixing Routing Algorithm

slide-11
SLIDE 11

Bit Routing Algorithm – Bad Case

  • The above algorithm may lead to lot of congestion in specific
  • permutations. Consider the following example.
  • Suppose that n is even. Write each source node s as the

concatenation of two binary strings as and bs each of length n/2. Let the destination of s's packet be the concatenation of bs and as. This permutation will take Omega(sqrt(n)).

slide-12
SLIDE 12

Two Phase Routing Algorithm

slide-13
SLIDE 13

Two Phase Routing Algorithm

In some sense, this is similar in spirit to Quicksort. For a list already sorted in reverse order, Quicksort would take O(n2) comparisons, whereas the expected number of comparisons for a randomly chosen permutation is only O( n log n). Randomizing the data can lead to a better running time for Quicksort. Here, too, randomizing the routes that packets take - by routing them through a random intermediate point - avoids bad initial permutations and leads to good expected performance.

slide-14
SLIDE 14

Two Phase Routing Algorithm

The two-phase routing algorithm is executed in parallel by all the packets. The random choices are made independently for each packet. Our analysis holds for any queueing policy that obeys the following natural requirement: if a queue is not empty at the beginning of a time step, some packet is sent along the edge associated with that queue during that time step. We prove that the above routing strategy achieves asymptotically optimal parallel time.

slide-15
SLIDE 15

Presenter: Shubhang Kulkarni

slide-16
SLIDE 16

v Analyze time for Phase I and argue Phase II by symmetry v Assume no packets start at Phase II until completion of Phase I Theorem

Main Result

In any permutation routing problem, the two-phase routing scheme routes all packets to their destinations in 𝑷(𝒐) time steps with high probability

slide-17
SLIDE 17

Technique Overview

Time for Phase I ≀ Time for any packet to reach destination ≀ Number of times its path is touched by any packet ≀ Number of times any path is touched by any packet ≀ (Our Bound) 30π‘œ w.h.p. Pr π΅π‘œπ‘§ π‘žπ‘π‘’β„Ž π‘’π‘π‘£π‘‘β„Žπ‘“π‘’ > π‘π‘π‘£π‘œπ‘’ ≀ Pr π‘“π‘€π‘“π‘œπ‘’ + Pr π΅π‘œπ‘§ π‘žπ‘π‘’β„Ž π‘’π‘π‘£π‘‘β„Žπ‘“π‘’ > π‘π‘π‘£π‘œπ‘’ π‘“π‘€π‘“π‘œπ‘’]. ≀ Very small

= >?

slide-18
SLIDE 18

v 𝑁: Packet v 𝑓: Edge v P: Path (sequence of edges) v π‘ˆ 𝑁 : Number of time steps for 𝑁 to reach destination v π‘ˆ 𝑄 : Number of times edges of 𝑄 are used v 𝑂 𝑓 : Number of packets traversing over edge 𝑓 π‘ˆ 𝑁 ≀ E 𝑂(𝑓F)

  • FH=

Let 𝑓= 𝑓> β‹― 𝑓J be the edges traversed by 𝑁 In each time step, 𝑁 halts at a node, or traverses an edge. Let 𝑄 = 𝑓= 𝑓>β‹― 𝑓J be any valid path by the bit fixing algorithm π‘ˆ 𝑄 = E 𝑂(𝑓F)

  • FH=

π‘ˆ 𝑁 ≀ π‘ˆ(𝑄) Time for a packet is upper bounded by number

  • f times its path is touched

Preliminary Notation

slide-19
SLIDE 19

Active Packets

Path 𝑄 is a possible packet path if it may be the outcome of the bit fixing algorithm Fix a possible packet path 𝑄 = 𝑀L𝑀= β‹― 𝑀J. A packet 𝑁 is active at 𝑀F if the following two conditions happen: 𝑀F 𝑀FM= 1 2 β‹― β‹― β‹― π‘˜ Differ in π‘˜QR bit β‹― β‹― π‘œ

  • 1. 𝑀F and 𝑀FM= differ in π‘˜QR bit
  • 2. Packet 𝑁 does not have its π‘˜QR bit fixed by the bit fixing algorithm
  • Less than π‘˜ bits of 𝑁 have been fixed
  • 𝑁 comes from a distance less than π‘˜ to 𝑀F

A packet is active if it is active at any node 𝑀F

slide-20
SLIDE 20

Bounding Active Packets

For every vertex 𝑙 ∈ 𝑂 , define the indicator variable 𝐡V as follows: 𝐡V = 1 … If packet starting at node 𝑙 is active … Otherwise 𝐡V are independent as

  • Depend only on intermediate destination
  • Choice of intermediate destination is independent for each packet

𝐡 = E 𝐡V

V FH=

Is the total number of active packets 𝐹 𝐡 = ?

slide-21
SLIDE 21

Bounding Active Packets

𝑑= 𝑑Z 𝑑

[

𝑑

[\=

𝑑

[M=

𝑒= 𝑑Z 𝑑

[

𝑒[\= 𝑑

[M=

𝑒= 𝑑Z 𝑒[ 𝑒[\= 𝑑

[M=

𝑒= 𝑒Z 𝑒[ 𝑒[\= 𝑒[M= Source of P Destination of P 𝑀F 𝑀FM= 𝑄 v A packet can arrive at 𝑀F only if it starts from βˆ— β‹― βˆ— 𝑑

[ β‹― 𝑑Z

v A packet actually arrives at 𝑀F only if its random destination is (𝑒= β‹― 𝑒[\= βˆ— β‹― βˆ—) Pr π‘π‘ π‘ π‘—π‘€π‘—π‘œπ‘• 𝑏𝑒 𝑀F π‘π‘ π‘ π‘—π‘€π‘π‘š 𝑗𝑑 π‘žπ‘π‘‘π‘‘π‘—π‘π‘šπ‘“] = 1 2[\= Total number of possible arrivals ≀ 2[\= 𝐹 𝑂𝑣𝑛𝑐𝑓𝑠 𝑝𝑔 𝑏𝑑𝑒𝑗𝑀𝑓 π‘žπ‘π‘‘π‘™π‘“π‘’π‘‘ π‘žπ‘“π‘  𝑀𝑓𝑠𝑒𝑓𝑦 ≀ 1 𝐹 𝐡 ≀ 1 β‹… 𝑛 ≀ π‘œ Pr 𝐡 β‰₯ 6π‘œ ≀ 2\hZ By Chernoff Bounds We found our event!

slide-22
SLIDE 22

Bounding Path Time

v We now know that Pr 𝑏𝑑𝑒𝑗𝑀𝑓 π‘žπ‘π‘‘π‘™π‘“π‘’π‘‘ β‰₯ 6π‘œ ≀ π‘‘π‘π‘›π‘“π‘’β„Žπ‘—π‘œπ‘• π‘’π‘—π‘œπ‘§ v We can now bound the time for Phase I conditioning on high probability complement event v Use following inequality to get final bound: Pr 𝑄 = Pr 𝑄 𝑅] Pr 𝑅 + Pr 𝑄 𝑅 j] Pr 𝑅 j ≀ Pr 𝑅 + Pr 𝑄 𝑅 j] P ∢ 𝐹vent that T P β‰₯ π‘‘π‘œ Q ∢ πΉπ‘€π‘“π‘œπ‘’ π‘’β„Žπ‘π‘’ 𝐡 β‰₯ 6π‘œ

slide-23
SLIDE 23

Bounding Path Time

Observation 1: Observation 2: Due to the ordering of bit fixing, a packet that leaves 𝑄 cannot return to 𝑄 in this phase An active packet at 𝑀F, crosses the edge (𝑀F, 𝑀FM=) with probability at most

= >

Probability that the active packets cross edges of 𝑄 more than 30π‘œ times is less than probability that a fair coin flipped 36π‘œ times comes up heads fewer than 6π‘œ times Lemma: Can be thought of as flipping fair independent coins to generate next co-ordinate

slide-24
SLIDE 24

Bounding Path Time

Trial: each point in the algorithm where an active packet on path P, might cross an edge of P trial successful if packet leaves path failure if packet stays on path Since packet leaves 𝑄 on a successful trial, there can be at most 6π‘œ successful trials (due to our condition event!) Let π‘ŒF be the number of transitions that the 𝑗QR packet makes on 𝑄. Then π‘ŒF is a geometric random random variable with probability of success

= >

Let 𝑇hZ be an upper bound on the total path time 𝑇hZ = E π‘ŒF

hZ FH=

slide-25
SLIDE 25

Bounding Path Time

Let 𝑇hZ be an upper bound on the total path time 𝑇hZ = E π‘ŒF

hZ FH=

Thus, Pr π‘ˆ 𝑄 β‰₯ 30π‘œ 𝐡 ≀ 6π‘œ] ≀ Pr 𝑇hZ β‰₯ 30π‘œ ≀ Pr π‘Ž ≀ 6 ≀ 𝑓\

wx? y z y y

… by Chernoff bounds Let π‘Ž be the number of heads in 36n fair coin flips On simplifying we get that: 𝑓\

wx? y z y y

= 𝑓\{Z ≀ 2\|Z\= Time for our favorite inequality to get the desired bound!

slide-26
SLIDE 26

Bounding Path Time

Pr 𝑄 = Pr 𝑄 𝑅] Pr 𝑅 + Pr 𝑄 𝑅 j] Pr 𝑅 j ≀ Pr 𝑅 + Pr 𝑄 𝑅 j] Pr π‘ˆ 𝑄 β‰₯ 30π‘œ ≀ Pr 𝐡 > 6π‘œ + Pr π‘ˆ 𝑄 β‰₯ 30π‘œ 𝐡 ≀ 6π‘œ] ≀ 2\hZ + 2\|Z \= ≀ 2\|Z Due to bit fixing, a source and destination uniquely determines a possible path. Thus 2Z β‹… 2Z = 2>Z possible paths Union bounding over all these paths, we get probability that any possible packet path needing time more than 30π‘œ is at most 2>Z β‹… 2\|Z = 2\Z = 𝑃(𝑂\=)

slide-27
SLIDE 27

Phase II

v Can be viewed as running Phase I backwards v Instead of packets starting at given source and routing to a random sink, they start at a random origin and end at a given destination. v Hence no packet spends more than 30n steps in Phase II with probability 1 βˆ’ 𝑃(𝑂\=) v We may remove the assumption that packets begin Phase II only after Phase I has completed v Total number of packet traversals across the edges of any packet path during Phase I and Phase II together is bounded by 60π‘œ = 𝑃(π‘œ) with probability 1 βˆ’ 𝑃(𝑂\=) v The bound holds regardless of how the phases interact v This concludes the proof!