SlideShare a Scribd company logo
Dhinaharan Nagamalai et al. (Eds) : CSE, DBDM, CCNET, AIFL, SCOM, CICS, CSIP- 2014
pp. 191–196, 2014. © CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4416
ALGORITHMS FOR PACKET ROUTING IN
SWITCHING NETWORKS WITH
RECONFIGURATION OVERHEAD
Timotheos Aslanidis and Marios-Evangelos Kogias
National Technical University of Athens, Athens, Greece
ABSTRACT
Given a set of messages to be transmitted in packages from a set of sending stations to a set of
receiving stations, we are required to schedule the packages so as to achieve the minimum
possible time from the moment the 1st transmission initiates to the concluding of the last.
Preempting packets in order to reroute message remains, as part of some other packet to be
transmitted at a later time would be a great means to achieve our goal, if not for the fact that
each preemption will come with a reconfiguration cost that will delay our entire effort. The
problem has been extensively studied in the past and various algorithms have been proposed to
handle many variations of the problem. In this paper we propose an improved algorithm that we
call the Split-Graph Algorithm (SGA). To establish its efficiency we compare it, to two of the
algorithms developed in the past. These two are the best presented in bibliography so far, one in
terms of approximation ratio and one in terms of experimental results.
KEYWORDS
switching networks, packet, routing, scheduling, reconfiguration cost, approximation
1. INTRODUCTION
As the need for communication and dissemination of information increases in modern technology
based societies, so does the need for faster and more efficient networks and routing of packages
between stations. In this context switching networks and the transmission of large packets of data
between them, has become an issue of major importance and as information loads continue to
increase rapidly, it is expected that the need for well scheduled data transfers to decrease time and
resource usage, will keep on being an often addressed subject for many scientists and engineers.
In this manuscript and in the context of message scheduling and transmitting through switching
networks we consider the Preemptive Bipartite Scheduling problem (encountered as PBS in
bibliography). Given a set of n transmitting stations and a set of m receiving stations, we are
required to send across messages, each initiated from a specific transmitter, to reach an also
prespecified receiver station. The duration of each message is also predetermined for all messages
to be transmitted. Restrictions in the systems considered, are that no transmitter may transmit data
towards more than one receiver at any time, nor may a receiver receive, more than one message at
a time. Messages are sent in packages and to enhance transmission speed we are allowed to
preempt any package and continue transmission of any part of that package at a later time.
Unfortunately, since the system has to reconfigure after each preemption, any interruption of
192 Computer Science & Information Technology (CS & IT)
packets transmission will come with a time cost. Information on the data that was not sent has to
be saved and a new setup has to be initiated for the next packet to start transmitting. Consequently
prior to sending any of the packages there will be a setup overhead. We consider this overhead to
be constant for all transmission initiations. In this paper we aim to minimize the duration of the
aforementioned process.
2. PREVIOUS RESULTS
PBS is known to be NP-Complete [9] and proved to be 4/3-ε inapproximable for any ε>0, unless
P=NP in [4].
As PBS algorithms can be implemented in various applications, many polynomial time
algorithms have been designed to produce solutions close to the optimal, found in [1], [9], [12],
[8]. The best guaranteed approximation ratio so far is
1
2
d 1
−
+
, where d is the reconfiguration
cost, and is found in [1]. Experiments on the performance of various algorithms are presented in
[4] and [5].
The problem can be solved in polynomial time if we consider a zero setup cost or if we only want
to minimize the number of switchings [9]. Another variation of the problem for which the optimal
schedule can be calculated in polynomial time is presented in [1].
For the purposes of this paper we consider 2 algorithms published in the past:
• A-PBS(d+1), found in [1], which so far is the one with the lowest approximation ratio,
and
• A1, found in [5], which according to past experiments yields the best experimental
results.
To compute each packet to be transmitted, A-PBS(d+1) rounds up the time of each message to the
closest multiple of d+1 and calculates the packet reducing the workload of each station to the
minimum multiple of d+1.
On the other hand A1 computes an arbitrary packet with a maximum number of messages and
decides how to preempt by calculating a lower bound to the remaining transmissions cost to be
the minimum possible.
3. GRAPH REPRESENTATION AND NOTATIONS
Our data representation will be through a bipartite graph G(V,U,E). V will be the set of
transmitters, U the set of receivers while E, the set of edges, will correspond to the messages that
have to be transmitted from V to U. A weight (or cost) c(v,u), will be assigned to each of the
edges e=(v,u), to denote the time required to transmit the message from node v to node u. Edge
weights are considered to be non-negative integers.
Furthermore the following notation will be used: ∆=∆(G)=max{
v V
max(deg(v))
∈
,
u U
max(deg(u))
∈
},
that is, ∆ will denote the maximum number of messages that need to be either sent or received
from or to any of the stations.
Computer Science & Information Technology (CS & IT) 193
The function t: V∪U→Z*
+ will denote the total workload of any station, namely t(v)=
u U
c(v,u)
∈
∑
for any v∈V or t(u)=
v V
c(v,u)
∈
∑ for any u∈U.
W=W(G)=max{
v V
max(t(v))
∈
,
u U
max(t(u))
∈
}, that is W will denote the maximum transmission time of
the messages either sent to or received from any station.
d∈Z*
+ will denote the overhead to start the next transmission.
4. A HEURISTIC WITH IMPROVED RESULTS
For the purposes of our algorithm the initial graph is split in two parts. GM comprises edges of
weight at least d and Gm contains all edges of weight less than d. Our main concern for GM is to
keep reducing the workload for each of the stations, achieving the minimum transmission time
possible, whereas in the case of Gm, where edge weights are small in comparison to d, we aim in
minimizing the number of switchings. The intuition in designing this algorithm is that for
messages of long duration, priority on how to schedule has the message duration rather than the
number of preemptions, whilst for messages of shortest duration prioritized is the minimization of
the number of preemptions. In particular:
The Split-Graph Algorithm (SGA)
Step 1: Split the initial graph G(V,U,E) in two bipartite graphs Gm(Vm,Um,Em) and
GM(VM,UM,EM), where Vm=VM=V, Um=UM=U and Em contains all edges of weight less than d,
EM contains all edges of weight d or more. Clearly in this initiation step E=Em∪EM and
Em∩EM=∅.
Step 2: Use subroutine1 to find a maximal matching M, in GM.
Step 3: Use subroutine 2 to calculate the weight of the matching to be removed. Remove the
corresponding parts of the edges.
Step 4: Add edges to M, from Em to maximize |M| and remove them from Em.
Step 5: Move edges of weight less than d, from the graph induced by step 3 to Em.
Step 6: Repeat steps 2 to 5 until all edges initially in EM have been completely removed.
Step 7: Use subroutine 3 to calculate ∆m maximum matchings in Gm, where ∆m is the degree of
Gm.
Step 8: Schedule the messages as calculated in steps 2, 3 and 7.
Subroutine 1:
Step 1: M=∅ (Initialization of the matching).
Step 2: For each node w∈VM∪UM calculate t(w).
Step 3: Sort all nodes w∈VM∪UM in decreasing order of t(w). Let L be the induced list of nodes.
Step 4: Let w0 be the 1st node to appear in L. Run sequential search in L to find the 1st neighbor
of w0 appearing in L. Denote that neighbor by w1.
Step 5: M←M∪{w0, w1}.
Step 6: Remove w0, w1 from L.
Step 7: Repeat steps 2, to 6 until M becomes maximal.
194 Computer Science & Information Technology (CS & IT)
Subroutine 2:
Step 1: For each edge e=(v,u) of the matching M, with corresponding weight c(e) calculate what
the value W(G΄) of the induced graph G΄(V΄,U΄,E΄) would be if all edge weights in the matching
were to be reduced by c(e). In this case edges of cost less than c(e) would be completely removed.
Set
c(e) ,if W(G ) W(G) c(e)
r(e)
0, otherwise
′ = −
= 

Step 2: Calculate R=max{r(e) | e∈M}
Step 3: For each edge in M set its new weight c(e)=
c(e) R, if c(e) R
0, otherwise
 − >


.
Subroutine 3:
Step 1: Add nodes and edges to make Gm a regular graph of degree ∆m. New edges will be of zero
weight. In a regular graph, all nodes will be of the same degree.
Step 2: Calculate a maximum matching Mm in Gm and remove all edges of Mm from Gm. Gm’s
degree will now be reduced by 1.
Step 3: Repeat step 2 until Gm=∅.
5. EXPERIMENTAL RESULTS AND COMPARISON
Figure 1 represents each algorithms’ performance in terms of approximation ratio. 1000 test cases
have been ran for a 15 transmitters-15 receivers system for values of setup cost varying from 1 to
200 and message durations varying from 1 to 50. SGA performs significantly better than both A1
and A-PBS(d+1) and as the overhead increases it shows an increasingly improved performance. It
is important to mention that in practice, as information loads exponentially increase, the number
of stations and communication tasks increases and so does the setup cost. That is in fact the most
encountered situation nowadays.
Figure 1. Average approximation ratio comparison
Computer Science & Information Technology (CS & IT) 195
Figure 2 presents the worst performance that each algorithm had depending on the setup cost, in
terms of approximation ratio again. SGA is found to be once again a lot more efficient.
Furthermore, SGA in most cases has a worst case really close to the average showing that its
performance does not fluctuate much, making it an all cases a reliable tool for this type of
scheduling.
Figure 2. Worst approximation ratio comparison
In terms of running time, SGA also appears to be a lot more efficient, as experiments have shown
that A1 and A-PBS(d+1) are by up to 500% slower. This is mainly because SGA is based on an
entire different approach on how to schedule the messages, using subroutines that in general are a
lot faster than those used in previous papers.
6. DISCUSSION AND FUTURE WORK
Our newly presented algorithm (SGA), has proven to produce much more efficient routings both
in terms of hardware usage as well as time span. Therefore, we believe that the idea of splitting
the initial graph in parts can be further researched and depending on the magnitude of the edges
as well as the setup cost, the Split-Graph Algorithm’s efficiency can be further improved. An
approximation ratio for SGA could be established to be less than 2. Exploiting to a greater extend
algorithms that provide optimal solutions for special instances of the problem might also yield
interesting new approximation algorithms. Finally, lifting limitations of the problem or
introducing new ones could help in developing new classes of graphs for which polynomial
algorithms might provide an optimal schedule. Such algorithms could be the tools to designing
new and improved approximation algorithms.
REFERENCES
[1] F. Afrati, T. Aslanidis, E. Bampis, I. Milis, Scheduling in Switching Networks with Set-up Delays.
Journal of Combinatorial Optimization, vol. 9, issue 1, p.49-57, Feb 2005.
[2] G. Bongiovanni, D. Coppersmith and C. K.Wong, An optimal time slot assignment for an SS/TDMA
system with variable number of transponders, IEEE Trans. Commun. vol. 29, p. 721-726, 1981.
196 Computer Science & Information Technology (CS & IT)
[3] J. Cohen, E. Jeannot, N. Padoy and F. Wagner, Messages Scheduling for Parallel Data Redistribution
between Clusters, IEEE Transactions on Parallel and Distributed Systems, vol. 17, Number 10, p.
1163, 2006.
[4] J. Cohen, E. Jeannot, N. Padoy, Parallel Data Redistribution Over a Backbone, Technical Report RR-
4725, INRIA-Lorraine, February 2003.
[5] P. Crescenzi, X. Deng, C. H. Papadimitriou, On approximating a scheduling problem, Journal of
Combinatorial Optimization, vol. 5, p. 287-297, 2001.
[6] R. L. Cruz and S. Al-Harthi, Packet Scheduling with Switch Configuration Delays, in Proc. 39th
Annu. Allerton Conf. Commun., Contr., Comput., 2001.
[7] S. Even, A. Itai, A. Shamir, On the complexity of timetable and multicommodity flow problems
SIAM J. Comput., vol. 5, p. 691-703, 1976.
[8] I. S. Gopal, G. Bongiovanni, M. A. Bonucelli, D. T. Tang, C. K. Wong, An optimal switching
algorithm for multibeam satellite systems with variable bandwidth beams, IEEE Trans. Commun. vol.
30, p. 2475-2481, Nov. 1982.
[9] I. S. Gopal, C. K. Wong Minimizing the number of switchings in an SS/TDMA system IEEE Trans.
Commun. vol. 33, p. 497-501, 1985.
[10] T. Inukai, An efficient SS/TDMA time slot assignment algorithm IEEE Trans. Commun. vol 27, p.
1449-1455, Oct. 1979.
[11] E. Jeannot and F. Wagner, Two fast and efficient message scheduling algorithms for data
redistribution over a backbone, 18th International Parallel and Distributed Processing Symposium,
2004.
[12] A. Kesselman and K. Kogan, Nonpreemptive Scheduling of Optical Switches, IEEE Transactions in
Communications, vol. 55, number 6, p. 1212, 2007.
[13] K. S. Natarajan and S. B. Calo, Time slot assignment in an SS/TDMA system with minimum
switchings IBM Res. Rep. 1981.
[14] B. Towles and W. J. Dally, Guaranteed Scheduling of Switches with Configuration Overhead, in
Proc. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
INFOCOM ’02. pp. 342-351, June 2002.
Authors
Timotheos Aslanidis was born in Athens, Greece in 1974. He received his Mathematics
degree from the University of Athens in 1997 and a master's degree in computer science
in 2001. He is currently a phd candidate at the National and Technical University of
Athens in the department of electrical and computer engineering. His research interests
comprise but are not limited to computer theory, number theory, network algorithms and
data mining algorithms.
Marios-Evangelos Kogias was born in Athens in 1991. Currently, he is an undergraduate
student at the National Technical University of Athens pursuing a diploma in Electrical
and Computer Engineering. He is a passionate coder and interested mainly in operating
systems, computer networks and algorithms.

More Related Content

What's hot

Chap4 slides
Chap4 slidesChap4 slides
Chap4 slides
Jothish DL
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
Ahmar Hashmi
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_QianQian Han
 
Ijetr021226
Ijetr021226Ijetr021226
Ijetr021226
ER Publication.org
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
cscpconf
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
Ahmar Hashmi
 
Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH
Lino Possamai
 
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernet
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernetTraffic Class Assignment for Mixed-Criticality Frames in TTEthernet
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernet
Voica Gavrilut
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
Ahmar Hashmi
 
DIGITAL TRANSMISSION
DIGITAL TRANSMISSIONDIGITAL TRANSMISSION
DIGITAL TRANSMISSION
Avijeet Negel
 
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish CollectorDesign and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
IJERA Editor
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
nimay1
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
IJNSA Journal
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking
Neha Kurale
 
Telecom lect 4
Telecom lect 4Telecom lect 4
Telecom lect 4
Shiraz316
 

What's hot (16)

Chap4 slides
Chap4 slidesChap4 slides
Chap4 slides
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_Qian
 
Ijetr021226
Ijetr021226Ijetr021226
Ijetr021226
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 
Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH
 
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernet
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernetTraffic Class Assignment for Mixed-Criticality Frames in TTEthernet
Traffic Class Assignment for Mixed-Criticality Frames in TTEthernet
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
 
DIGITAL TRANSMISSION
DIGITAL TRANSMISSIONDIGITAL TRANSMISSION
DIGITAL TRANSMISSION
 
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish CollectorDesign and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Project 5 report 5.13 pm
Project 5 report 5.13 pmProject 5 report 5.13 pm
Project 5 report 5.13 pm
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking
 
Telecom lect 4
Telecom lect 4Telecom lect 4
Telecom lect 4
 

Viewers also liked

CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
With Company
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
Heinz Marketing Inc
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
Yuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 

Viewers also liked (8)

CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVERHEAD

IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
cscpconf
 
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
cscpconf
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
ijwmn
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
ijwmn
 
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
IJECEIAES
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
ijdpsjournal
 
Scheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic AlgorithmScheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic Algorithm
iosrjce
 
M017327378
M017327378M017327378
M017327378
IOSR Journals
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Associate Professor in VSB Coimbatore
 
A0420105
A0420105A0420105
A0420105
inventy
 
A0420105
A0420105A0420105
A0420105
inventy
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
ijwmn
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesCemal Ardil
 
cs.ds-2211.13454.pdf
cs.ds-2211.13454.pdfcs.ds-2211.13454.pdf
cs.ds-2211.13454.pdf
ssuser866937
 
2018867974 sulaim (2)
2018867974 sulaim (2)2018867974 sulaim (2)
2018867974 sulaim (2)
sulaim_qais
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Varad Meru
 
L010628894
L010628894L010628894
L010628894
IOSR Journals
 
B0440711
B0440711B0440711
B0440711
IJERA Editor
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
IJCSIS Research Publications
 

Similar to ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVERHEAD (20)

IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 
Scheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic AlgorithmScheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic Algorithm
 
M017327378
M017327378M017327378
M017327378
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
 
A0420105
A0420105A0420105
A0420105
 
A0420105
A0420105A0420105
A0420105
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particles
 
cs.ds-2211.13454.pdf
cs.ds-2211.13454.pdfcs.ds-2211.13454.pdf
cs.ds-2211.13454.pdf
 
2018867974 sulaim (2)
2018867974 sulaim (2)2018867974 sulaim (2)
2018867974 sulaim (2)
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
 
L010628894
L010628894L010628894
L010628894
 
B0440711
B0440711B0440711
B0440711
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVERHEAD

  • 1. Dhinaharan Nagamalai et al. (Eds) : CSE, DBDM, CCNET, AIFL, SCOM, CICS, CSIP- 2014 pp. 191–196, 2014. © CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4416 ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVERHEAD Timotheos Aslanidis and Marios-Evangelos Kogias National Technical University of Athens, Athens, Greece ABSTRACT Given a set of messages to be transmitted in packages from a set of sending stations to a set of receiving stations, we are required to schedule the packages so as to achieve the minimum possible time from the moment the 1st transmission initiates to the concluding of the last. Preempting packets in order to reroute message remains, as part of some other packet to be transmitted at a later time would be a great means to achieve our goal, if not for the fact that each preemption will come with a reconfiguration cost that will delay our entire effort. The problem has been extensively studied in the past and various algorithms have been proposed to handle many variations of the problem. In this paper we propose an improved algorithm that we call the Split-Graph Algorithm (SGA). To establish its efficiency we compare it, to two of the algorithms developed in the past. These two are the best presented in bibliography so far, one in terms of approximation ratio and one in terms of experimental results. KEYWORDS switching networks, packet, routing, scheduling, reconfiguration cost, approximation 1. INTRODUCTION As the need for communication and dissemination of information increases in modern technology based societies, so does the need for faster and more efficient networks and routing of packages between stations. In this context switching networks and the transmission of large packets of data between them, has become an issue of major importance and as information loads continue to increase rapidly, it is expected that the need for well scheduled data transfers to decrease time and resource usage, will keep on being an often addressed subject for many scientists and engineers. In this manuscript and in the context of message scheduling and transmitting through switching networks we consider the Preemptive Bipartite Scheduling problem (encountered as PBS in bibliography). Given a set of n transmitting stations and a set of m receiving stations, we are required to send across messages, each initiated from a specific transmitter, to reach an also prespecified receiver station. The duration of each message is also predetermined for all messages to be transmitted. Restrictions in the systems considered, are that no transmitter may transmit data towards more than one receiver at any time, nor may a receiver receive, more than one message at a time. Messages are sent in packages and to enhance transmission speed we are allowed to preempt any package and continue transmission of any part of that package at a later time. Unfortunately, since the system has to reconfigure after each preemption, any interruption of
  • 2. 192 Computer Science & Information Technology (CS & IT) packets transmission will come with a time cost. Information on the data that was not sent has to be saved and a new setup has to be initiated for the next packet to start transmitting. Consequently prior to sending any of the packages there will be a setup overhead. We consider this overhead to be constant for all transmission initiations. In this paper we aim to minimize the duration of the aforementioned process. 2. PREVIOUS RESULTS PBS is known to be NP-Complete [9] and proved to be 4/3-ε inapproximable for any ε>0, unless P=NP in [4]. As PBS algorithms can be implemented in various applications, many polynomial time algorithms have been designed to produce solutions close to the optimal, found in [1], [9], [12], [8]. The best guaranteed approximation ratio so far is 1 2 d 1 − + , where d is the reconfiguration cost, and is found in [1]. Experiments on the performance of various algorithms are presented in [4] and [5]. The problem can be solved in polynomial time if we consider a zero setup cost or if we only want to minimize the number of switchings [9]. Another variation of the problem for which the optimal schedule can be calculated in polynomial time is presented in [1]. For the purposes of this paper we consider 2 algorithms published in the past: • A-PBS(d+1), found in [1], which so far is the one with the lowest approximation ratio, and • A1, found in [5], which according to past experiments yields the best experimental results. To compute each packet to be transmitted, A-PBS(d+1) rounds up the time of each message to the closest multiple of d+1 and calculates the packet reducing the workload of each station to the minimum multiple of d+1. On the other hand A1 computes an arbitrary packet with a maximum number of messages and decides how to preempt by calculating a lower bound to the remaining transmissions cost to be the minimum possible. 3. GRAPH REPRESENTATION AND NOTATIONS Our data representation will be through a bipartite graph G(V,U,E). V will be the set of transmitters, U the set of receivers while E, the set of edges, will correspond to the messages that have to be transmitted from V to U. A weight (or cost) c(v,u), will be assigned to each of the edges e=(v,u), to denote the time required to transmit the message from node v to node u. Edge weights are considered to be non-negative integers. Furthermore the following notation will be used: ∆=∆(G)=max{ v V max(deg(v)) ∈ , u U max(deg(u)) ∈ }, that is, ∆ will denote the maximum number of messages that need to be either sent or received from or to any of the stations.
  • 3. Computer Science & Information Technology (CS & IT) 193 The function t: V∪U→Z* + will denote the total workload of any station, namely t(v)= u U c(v,u) ∈ ∑ for any v∈V or t(u)= v V c(v,u) ∈ ∑ for any u∈U. W=W(G)=max{ v V max(t(v)) ∈ , u U max(t(u)) ∈ }, that is W will denote the maximum transmission time of the messages either sent to or received from any station. d∈Z* + will denote the overhead to start the next transmission. 4. A HEURISTIC WITH IMPROVED RESULTS For the purposes of our algorithm the initial graph is split in two parts. GM comprises edges of weight at least d and Gm contains all edges of weight less than d. Our main concern for GM is to keep reducing the workload for each of the stations, achieving the minimum transmission time possible, whereas in the case of Gm, where edge weights are small in comparison to d, we aim in minimizing the number of switchings. The intuition in designing this algorithm is that for messages of long duration, priority on how to schedule has the message duration rather than the number of preemptions, whilst for messages of shortest duration prioritized is the minimization of the number of preemptions. In particular: The Split-Graph Algorithm (SGA) Step 1: Split the initial graph G(V,U,E) in two bipartite graphs Gm(Vm,Um,Em) and GM(VM,UM,EM), where Vm=VM=V, Um=UM=U and Em contains all edges of weight less than d, EM contains all edges of weight d or more. Clearly in this initiation step E=Em∪EM and Em∩EM=∅. Step 2: Use subroutine1 to find a maximal matching M, in GM. Step 3: Use subroutine 2 to calculate the weight of the matching to be removed. Remove the corresponding parts of the edges. Step 4: Add edges to M, from Em to maximize |M| and remove them from Em. Step 5: Move edges of weight less than d, from the graph induced by step 3 to Em. Step 6: Repeat steps 2 to 5 until all edges initially in EM have been completely removed. Step 7: Use subroutine 3 to calculate ∆m maximum matchings in Gm, where ∆m is the degree of Gm. Step 8: Schedule the messages as calculated in steps 2, 3 and 7. Subroutine 1: Step 1: M=∅ (Initialization of the matching). Step 2: For each node w∈VM∪UM calculate t(w). Step 3: Sort all nodes w∈VM∪UM in decreasing order of t(w). Let L be the induced list of nodes. Step 4: Let w0 be the 1st node to appear in L. Run sequential search in L to find the 1st neighbor of w0 appearing in L. Denote that neighbor by w1. Step 5: M←M∪{w0, w1}. Step 6: Remove w0, w1 from L. Step 7: Repeat steps 2, to 6 until M becomes maximal.
  • 4. 194 Computer Science & Information Technology (CS & IT) Subroutine 2: Step 1: For each edge e=(v,u) of the matching M, with corresponding weight c(e) calculate what the value W(G΄) of the induced graph G΄(V΄,U΄,E΄) would be if all edge weights in the matching were to be reduced by c(e). In this case edges of cost less than c(e) would be completely removed. Set c(e) ,if W(G ) W(G) c(e) r(e) 0, otherwise ′ = − =   Step 2: Calculate R=max{r(e) | e∈M} Step 3: For each edge in M set its new weight c(e)= c(e) R, if c(e) R 0, otherwise  − >   . Subroutine 3: Step 1: Add nodes and edges to make Gm a regular graph of degree ∆m. New edges will be of zero weight. In a regular graph, all nodes will be of the same degree. Step 2: Calculate a maximum matching Mm in Gm and remove all edges of Mm from Gm. Gm’s degree will now be reduced by 1. Step 3: Repeat step 2 until Gm=∅. 5. EXPERIMENTAL RESULTS AND COMPARISON Figure 1 represents each algorithms’ performance in terms of approximation ratio. 1000 test cases have been ran for a 15 transmitters-15 receivers system for values of setup cost varying from 1 to 200 and message durations varying from 1 to 50. SGA performs significantly better than both A1 and A-PBS(d+1) and as the overhead increases it shows an increasingly improved performance. It is important to mention that in practice, as information loads exponentially increase, the number of stations and communication tasks increases and so does the setup cost. That is in fact the most encountered situation nowadays. Figure 1. Average approximation ratio comparison
  • 5. Computer Science & Information Technology (CS & IT) 195 Figure 2 presents the worst performance that each algorithm had depending on the setup cost, in terms of approximation ratio again. SGA is found to be once again a lot more efficient. Furthermore, SGA in most cases has a worst case really close to the average showing that its performance does not fluctuate much, making it an all cases a reliable tool for this type of scheduling. Figure 2. Worst approximation ratio comparison In terms of running time, SGA also appears to be a lot more efficient, as experiments have shown that A1 and A-PBS(d+1) are by up to 500% slower. This is mainly because SGA is based on an entire different approach on how to schedule the messages, using subroutines that in general are a lot faster than those used in previous papers. 6. DISCUSSION AND FUTURE WORK Our newly presented algorithm (SGA), has proven to produce much more efficient routings both in terms of hardware usage as well as time span. Therefore, we believe that the idea of splitting the initial graph in parts can be further researched and depending on the magnitude of the edges as well as the setup cost, the Split-Graph Algorithm’s efficiency can be further improved. An approximation ratio for SGA could be established to be less than 2. Exploiting to a greater extend algorithms that provide optimal solutions for special instances of the problem might also yield interesting new approximation algorithms. Finally, lifting limitations of the problem or introducing new ones could help in developing new classes of graphs for which polynomial algorithms might provide an optimal schedule. Such algorithms could be the tools to designing new and improved approximation algorithms. REFERENCES [1] F. Afrati, T. Aslanidis, E. Bampis, I. Milis, Scheduling in Switching Networks with Set-up Delays. Journal of Combinatorial Optimization, vol. 9, issue 1, p.49-57, Feb 2005. [2] G. Bongiovanni, D. Coppersmith and C. K.Wong, An optimal time slot assignment for an SS/TDMA system with variable number of transponders, IEEE Trans. Commun. vol. 29, p. 721-726, 1981.
  • 6. 196 Computer Science & Information Technology (CS & IT) [3] J. Cohen, E. Jeannot, N. Padoy and F. Wagner, Messages Scheduling for Parallel Data Redistribution between Clusters, IEEE Transactions on Parallel and Distributed Systems, vol. 17, Number 10, p. 1163, 2006. [4] J. Cohen, E. Jeannot, N. Padoy, Parallel Data Redistribution Over a Backbone, Technical Report RR- 4725, INRIA-Lorraine, February 2003. [5] P. Crescenzi, X. Deng, C. H. Papadimitriou, On approximating a scheduling problem, Journal of Combinatorial Optimization, vol. 5, p. 287-297, 2001. [6] R. L. Cruz and S. Al-Harthi, Packet Scheduling with Switch Configuration Delays, in Proc. 39th Annu. Allerton Conf. Commun., Contr., Comput., 2001. [7] S. Even, A. Itai, A. Shamir, On the complexity of timetable and multicommodity flow problems SIAM J. Comput., vol. 5, p. 691-703, 1976. [8] I. S. Gopal, G. Bongiovanni, M. A. Bonucelli, D. T. Tang, C. K. Wong, An optimal switching algorithm for multibeam satellite systems with variable bandwidth beams, IEEE Trans. Commun. vol. 30, p. 2475-2481, Nov. 1982. [9] I. S. Gopal, C. K. Wong Minimizing the number of switchings in an SS/TDMA system IEEE Trans. Commun. vol. 33, p. 497-501, 1985. [10] T. Inukai, An efficient SS/TDMA time slot assignment algorithm IEEE Trans. Commun. vol 27, p. 1449-1455, Oct. 1979. [11] E. Jeannot and F. Wagner, Two fast and efficient message scheduling algorithms for data redistribution over a backbone, 18th International Parallel and Distributed Processing Symposium, 2004. [12] A. Kesselman and K. Kogan, Nonpreemptive Scheduling of Optical Switches, IEEE Transactions in Communications, vol. 55, number 6, p. 1212, 2007. [13] K. S. Natarajan and S. B. Calo, Time slot assignment in an SS/TDMA system with minimum switchings IBM Res. Rep. 1981. [14] B. Towles and W. J. Dally, Guaranteed Scheduling of Switches with Configuration Overhead, in Proc. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM ’02. pp. 342-351, June 2002. Authors Timotheos Aslanidis was born in Athens, Greece in 1974. He received his Mathematics degree from the University of Athens in 1997 and a master's degree in computer science in 2001. He is currently a phd candidate at the National and Technical University of Athens in the department of electrical and computer engineering. His research interests comprise but are not limited to computer theory, number theory, network algorithms and data mining algorithms. Marios-Evangelos Kogias was born in Athens in 1991. Currently, he is an undergraduate student at the National Technical University of Athens pursuing a diploma in Electrical and Computer Engineering. He is a passionate coder and interested mainly in operating systems, computer networks and algorithms.