SlideShare a Scribd company logo
 In Routing schemes there is trade-off between the Routing table
size and stretch.
Stretch of path p(u; v) from node u to node v is defined as
|p(u; v) |/|d(u;v)| , where |d(u; v)| is the length of the
shortest u-v path.
 Naive Scheme : Each node holds the next hop to all nodes and
employs optimal routing
 Routing Table size is O(n log(n)) at each node
where n : number of nodes
 Stretch =1 ( optimum path)
By this Compact Routing Method
 Routing Table size bound - O(n2/3 log4/3 (n))
 Maximum stretch ≤ 3
 Nodes are connected with arbitrary weighted
undirected edges
 Reassign the node names in lexicographic
order, with bound O(log(n))
 Edges identified by port names, locally
relevant
 Concept of Landmark based routing
 Re-Labeling of nodes
 Storage in Routing Table
 Routing Procedure
 Every node name is represented as a
 Triplet –
( orig. node name, name of its landmark, edge from landmark to the
node)
eg . V <- (v, lv, elv(v)) where
elv(v) : is the edge from landmark to the node on shortest path,
lv : Landmark of v
 For each v ∈ V
lv argminl∈L d(l; v) //closest landmark to node v
 For each l ∈ L perform truncated-Dijkstra(nα )
 For each v ∈ VL
V <- (v; lv ; elv(v)) // the first link on the
shortest path from lv to v
 1) Extended Dominating Set – spans the
neighborhood of all nodes in the network,
obtained by Greedy Algorithm
 2) Nodes in neighborhood of maximum
nodes, selected as Landmark

V1
V2 V3
V4
V5
V6
V9
V7
V11
V10
V12
V8
 Find set D, the Extended Dominating Set, using Greedy Algorithm
(here α is a parameter s.t. 0<α <1)
Ǝ D ⊂ V such that
• |D| = O(n1-α log n)
• ∀ v ∈V , D ∩ Bv ≠ φ
Where Bv is the neighborhood of vertex ‘v’ of size nα
 Find set C, set of nodes which lie in neighbourhood of maximum nodes
C ⊂ V s.t. ∀ c ∈ C , |Rc| ≥ n(1+α)/2
 Set of Landmarks, L =D ∪ C
 For non-landmark nodes – information of
neighbour and all landmarks is stored .
 For landmarks - information of landmarks
only is stored , otherwise routing table is
huge at landmark
//For neighbours of node v
For each v ∈ V, perform truncated-Dijkstra(nα)
For each u reached from v:
If no landmark is on the path from v to u:
store(v, eu(v)) at u
// shortest paths from landmarks to every node
For each l ∈ L, perform full-Dijkstra(nα)
For each v ∈ V
Store (l, eu(l)) at u
V1
V2 V3
V4
V5
V6
V9
V7
V11
V10
V12
V8
NODE PORT
V2 1
V4 1
V3 2
V10 2
1
1
2
3
1
2
2
1
V3 4
….
4
1 2
3
neighbours
landmarks
At node u, a packet with destination (v; lv;elv(v))
is routed as –
 If u=lv (landmark)-> route along elv(v).
 If not, but (v; eu(v)) is in u's local routing table
-> route along eu(v).
 Else route along (lv ; eu(lv)).
 A set of landmarks (L) is |L|= O(n1-α log n + n(1+α)/2)
 If d(u; v) < d(lv ; v) then u is not a landmark and ∄
a landmark on the shortest path from u to v.
 For each v, lv is among v's n closest neighbors.
 For each x ≠ lv on the shortest path from lv to v,
(x; ex(v)) is stored at x.
 Let d(u; v) denote the length of the shortest
path from u to v. Then the routing algorithm
returns a path of length at most 3d(u; v).
 The local storage space used at each
node is O((n 1- α log n + n(1+α)/2) log n).
 Using α = 1/3 + (2 log log n)/(3 log n), we get the
bound for size as O(n2/3 log4/3 (n))
By Mikkel Thorup & Uri Zwick
 Suggests new routing for trees
 Improvement of Routing Table size
(in landmark based routing technique)
from O(n2/3 log4/3 (n)) to O(n1/2 log(n)) for stretch 3
 General Routing technique for Graphs
Stretch Table Size Handshaking?
3 O(n1/2) no
5 O(n1/3) yes
7 O(n1/3) no
2k-1 O(n1/k) yes
4k-5 O(kn1/k) no
New Routing Schemes
Authors Stretch Table Size
Cowen 3 O(n2/3)
Eilam,Gavoille 5 O(n1/2)
Awerbuch, Peleg O(k2) O(kn1/k)
Awerbuch O(k29k) O(kn1/k)
Previous Available Schemes
Each vertex is assigned a (1+o(1))log2n–bit
label.
Given label(u) and label(v), it is possible to
find, in constant time, the right edge to take
from u.
Similar result by Fraigniaud and Gavoille
[ICALP’01]
u
v
4 5 6
1
2
3 8
10
9
11
7
12
DFS Enumeration of Nodes
1
2
3
4
5 6
8
7
9
10
11
1-2
3-11
Stretch=1
RT=O(d log n)
Header= O(logn)
d= degree(node)
12
Single source shortest path routing:
 Root the tree arbitrarily
 Perform depth first enumeration of the vertices
 let fw be the largest descendent of w
 vertex v is descendent of w iff v ∈(w , fw)
 else is sent to parent of w using parent pointer of
w
 O(log2n)-bit labels.
Arbitrary port numbers.
DFS numbering:
For every vertex u, let fu
be the largest descendant of u. Then v is a
descendant of u iff 4
],[ ufuv
1
2 10
113
65
12
1413
7
98
10
7
A trivial solution with O(deg(v)) memory.
 Let s(v) be the number of descendants of v.
 Let pv be the parent of v. Then,
vertex v is heavy if s(v) s(pv)/2, and
light otherwise.
14
8 2
17
1 41
3
11
3
11
0
1
2
2
3
3
4
The light-level lv of a vertex v is the number of light vertices
on the path to it from the root.
Claim: lv<log2n
label(v)=(v,port(e1),port(e2),…)
At v we store:
(v, fv, hv, lv, port(v,pv) and port(v,hv))
e1
e2
e3
r
v
e4
 Each vertex ‘v’ assigned (1+O(1))log2n-bit label
 Label is the only information stored at the vertex
 Label serves as header attached to messages sent
to the vertex
 Routing decision takes constant time
 Weight sv of a vertex v is number of descendents in the tree
 A child v’ is said to be heavy if sv’>sv/b Else light
 Light level lv is def as the number of light vertices on the path
from r to v
 Enumerate tree in depth first order – where light vertices
visited before heavy children
 Routing information stored at v =(v,fv,hv,Hv,Pv) = O(b) words
 hv is the first heavy child of v
 Hv -> array of heavy children of v
 Pv ->array of port no to parent & heavy nodes
 < v0,v1,v2,….,vk> where v0=r and vi is the light nodes from r
to node v , vk=v
 LV=(port(vi1-1), port(vi2-1),……, port(vilv-1))= O(logbn)
 Label(v)=(v , Lv)
 At node w for header (v,Lv)
 If w=v – done
 Else if v ∈(w , fw) – if not not a descendent
forward to parent of w using Pv[0]
 Else if descendent check v ∈(hw , fw) – search
Hw and get corresponding Pw
 Else light descendent – search Lv[lw]
 Eg. b=2
 ((v>=w && v <h) ? L[1] : P[v>=h && v<=f])
centA(v) = a center closest to v
clusterA(v) = vertices that are closer to v than to all centers.
cluster
u vw
For any w on the shortest
path we have v clusterA(w).
u
v
centA(v)
),(3)),(())(,(
),(2))(,(
),()),((
vuvvcentvcentu
vuvcentu
vuvvcent
AA
A
A
Label(v)=
(v,centA(v),port(centA(v),v))
 We want A such that
 |A|=O(n1/2)
 clusterA(v)=O(n1/2), for every v
 [Cowen does this with O(n2/3)]
 Weight sv of a vertex v is the number of
descendants in the tree
 v’ is the heavy child & v0,v1,v2,….,vd-1 be its
light children in decreasing order of weight
 sv’>sv0>sv1>sv2>sv3>……>svd
 All the strings are concatenated and stored,
masking bits are to identify the lengths of
each string
 label(v)=(v,Lv,Mv)
 Header size =3.4logn
 Code(s)=s.bin(||s||,|s|).bin(||s||,||s||)
 Label(v)=ID(v) + RT(v)
 ID(v) consists of –
 Binary representation of i, the index of heavy
path containing v
 String s corresponding to v¯ =v
 ID(T; v) =ID(Tv ; v):code(i):code(sj ):code(port( v; v)) if v ≠ v,
code(i):code(sj ) otherwise
 Label(v) = code(ID(v)):code(RT(v)):code(pnt(v))
Algorithm center(G)
A ; W V;
While W
{
A A choose(W,n1/2);
W {w V | clusterA(w)>4n1/2 };
}
Return A;
The expected size of A is O(n1/2log n).
Improvement over Cowen’s landmark based
routing scheme
 Use a hierarchy of centers.
 Construct a tree cover
of the graph.
 Identify an appropriate tree from the cover and route on it.
Generalized routing scheme
Each vertex contained in at most n1/k trees.
For every u,v, there is a tree with a path of
stretch at most 2k-1 between them.
 Table size = O(n1/k)
 Label size = O(log n)
 No handshaking
???

More Related Content

What's hot

Time-Variant Distortions in OFDM
Time-Variant Distortions in OFDMTime-Variant Distortions in OFDM
Time-Variant Distortions in OFDMAhmed Alshomi
 
Paris Master Class 2011 - 06 Gpu Particle System
Paris Master Class 2011 - 06 Gpu Particle SystemParis Master Class 2011 - 06 Gpu Particle System
Paris Master Class 2011 - 06 Gpu Particle System
Wolfgang Engel
 
Ch39 ssm
Ch39 ssmCh39 ssm
Ch39 ssm
Marta Díaz
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
Amirul Wiramuda
 
Bellmon Ford Algorithm
Bellmon Ford AlgorithmBellmon Ford Algorithm
Bellmon Ford Algorithm
69RishabhPandey
 
Advances in Directed Spanners
Advances in Directed SpannersAdvances in Directed Spanners
Advances in Directed Spanners
Grigory Yaroslavtsev
 
Sub-Graph Centric Single Source Shortest Path
Sub-Graph Centric Single Source Shortest PathSub-Graph Centric Single Source Shortest Path
Sub-Graph Centric Single Source Shortest Pathcharithwiki
 
Sound analysis and processing with MATLAB
Sound analysis and processing with MATLABSound analysis and processing with MATLAB
Sound analysis and processing with MATLAB
Tan Hoang Luu
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithm
Malinga Perera
 
noise removal in matlab
noise removal in matlabnoise removal in matlab
noise removal in matlab
umarjamil10000
 
MLP輪読スパース8章 トレースノルム正則化
MLP輪読スパース8章 トレースノルム正則化MLP輪読スパース8章 トレースノルム正則化
MLP輪読スパース8章 トレースノルム正則化
Akira Tanimoto
 
Topic modeling with Poisson factorization (2)
Topic modeling with Poisson factorization (2)Topic modeling with Poisson factorization (2)
Topic modeling with Poisson factorization (2)
Tomonari Masada
 
Poisson factorization
Poisson factorizationPoisson factorization
Poisson factorization
Tomonari Masada
 
First order active rc sections hw1
First order active rc sections hw1First order active rc sections hw1
First order active rc sections hw1
Hoopeer Hoopeer
 
Fourier transforms of discrete signals (DSP) 5
Fourier transforms of discrete signals (DSP) 5Fourier transforms of discrete signals (DSP) 5
Fourier transforms of discrete signals (DSP) 5
HIMANSHU DIWAKAR
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
Aleksandr Yampolskiy
 

What's hot (19)

Time-Variant Distortions in OFDM
Time-Variant Distortions in OFDMTime-Variant Distortions in OFDM
Time-Variant Distortions in OFDM
 
Paris Master Class 2011 - 06 Gpu Particle System
Paris Master Class 2011 - 06 Gpu Particle SystemParis Master Class 2011 - 06 Gpu Particle System
Paris Master Class 2011 - 06 Gpu Particle System
 
Solution a ph o 3
Solution a ph o 3Solution a ph o 3
Solution a ph o 3
 
Ch39 ssm
Ch39 ssmCh39 ssm
Ch39 ssm
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 
Bellmon Ford Algorithm
Bellmon Ford AlgorithmBellmon Ford Algorithm
Bellmon Ford Algorithm
 
Advances in Directed Spanners
Advances in Directed SpannersAdvances in Directed Spanners
Advances in Directed Spanners
 
Sub-Graph Centric Single Source Shortest Path
Sub-Graph Centric Single Source Shortest PathSub-Graph Centric Single Source Shortest Path
Sub-Graph Centric Single Source Shortest Path
 
Sound analysis and processing with MATLAB
Sound analysis and processing with MATLABSound analysis and processing with MATLAB
Sound analysis and processing with MATLAB
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithm
 
Lifting 1
Lifting 1Lifting 1
Lifting 1
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
noise removal in matlab
noise removal in matlabnoise removal in matlab
noise removal in matlab
 
MLP輪読スパース8章 トレースノルム正則化
MLP輪読スパース8章 トレースノルム正則化MLP輪読スパース8章 トレースノルム正則化
MLP輪読スパース8章 トレースノルム正則化
 
Topic modeling with Poisson factorization (2)
Topic modeling with Poisson factorization (2)Topic modeling with Poisson factorization (2)
Topic modeling with Poisson factorization (2)
 
Poisson factorization
Poisson factorizationPoisson factorization
Poisson factorization
 
First order active rc sections hw1
First order active rc sections hw1First order active rc sections hw1
First order active rc sections hw1
 
Fourier transforms of discrete signals (DSP) 5
Fourier transforms of discrete signals (DSP) 5Fourier transforms of discrete signals (DSP) 5
Fourier transforms of discrete signals (DSP) 5
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 

Similar to Compactrouting

Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
Meenakshi Tripathi
 
Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Traian Rebedea
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
WahyuAde4
 
lecture 16
lecture 16lecture 16
lecture 16sajinsc
 
Algorithm to count number of disjoint paths
Algorithm to count number of disjoint pathsAlgorithm to count number of disjoint paths
Algorithm to count number of disjoint paths
Sujith Jay Nair
 
Daa chpater14
Daa chpater14Daa chpater14
Daa chpater14
B.Kirron Reddi
 
AAD_Lec-3-B-ShortestPaths.ppt of design and analysis of algorithm
AAD_Lec-3-B-ShortestPaths.ppt  of design and analysis of algorithmAAD_Lec-3-B-ShortestPaths.ppt  of design and analysis of algorithm
AAD_Lec-3-B-ShortestPaths.ppt of design and analysis of algorithm
SantoshDood
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
Venkat Sai Sharath Mudhigonda
 
bellman-ford Theorem.ppt
bellman-ford Theorem.pptbellman-ford Theorem.ppt
bellman-ford Theorem.ppt
SaimaShaheen14
 
B.tech admission in india
B.tech admission in indiaB.tech admission in india
B.tech admission in india
Edhole.com
 
Temporal graph
Temporal graphTemporal graph
Temporal graph
Vinay Sarda
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
AIRCC Publishing Corporation
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
AIRCC Publishing Corporation
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ijcsit
 
19-graph1 (1).ppt
19-graph1 (1).ppt19-graph1 (1).ppt
19-graph1 (1).ppt
Himajanaidu2
 
BFS, Breadth first search | Search Traversal Algorithm
BFS, Breadth first search | Search Traversal AlgorithmBFS, Breadth first search | Search Traversal Algorithm
BFS, Breadth first search | Search Traversal Algorithm
MSA Technosoft
 
04 greedyalgorithmsii
04 greedyalgorithmsii04 greedyalgorithmsii
04 greedyalgorithmsii
LENIN Quintero
 
Shortest Paths Part 2: Negative Weights and All-pairs
Shortest Paths Part 2: Negative Weights and All-pairsShortest Paths Part 2: Negative Weights and All-pairs
Shortest Paths Part 2: Negative Weights and All-pairs
Benjamin Sach
 

Similar to Compactrouting (20)

Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
 
Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
lecture 16
lecture 16lecture 16
lecture 16
 
Graps 2
Graps 2Graps 2
Graps 2
 
Algorithm to count number of disjoint paths
Algorithm to count number of disjoint pathsAlgorithm to count number of disjoint paths
Algorithm to count number of disjoint paths
 
Daa chpater14
Daa chpater14Daa chpater14
Daa chpater14
 
AAD_Lec-3-B-ShortestPaths.ppt of design and analysis of algorithm
AAD_Lec-3-B-ShortestPaths.ppt  of design and analysis of algorithmAAD_Lec-3-B-ShortestPaths.ppt  of design and analysis of algorithm
AAD_Lec-3-B-ShortestPaths.ppt of design and analysis of algorithm
 
Graphs
GraphsGraphs
Graphs
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
 
bellman-ford Theorem.ppt
bellman-ford Theorem.pptbellman-ford Theorem.ppt
bellman-ford Theorem.ppt
 
B.tech admission in india
B.tech admission in indiaB.tech admission in india
B.tech admission in india
 
Temporal graph
Temporal graphTemporal graph
Temporal graph
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
19-graph1 (1).ppt
19-graph1 (1).ppt19-graph1 (1).ppt
19-graph1 (1).ppt
 
BFS, Breadth first search | Search Traversal Algorithm
BFS, Breadth first search | Search Traversal AlgorithmBFS, Breadth first search | Search Traversal Algorithm
BFS, Breadth first search | Search Traversal Algorithm
 
04 greedyalgorithmsii
04 greedyalgorithmsii04 greedyalgorithmsii
04 greedyalgorithmsii
 
Shortest Paths Part 2: Negative Weights and All-pairs
Shortest Paths Part 2: Negative Weights and All-pairsShortest Paths Part 2: Negative Weights and All-pairs
Shortest Paths Part 2: Negative Weights and All-pairs
 

More from Meenakshi Tripathi

Cryptoppt
CryptopptCryptoppt
Warmhole routing ppt
Warmhole routing pptWarmhole routing ppt
Warmhole routing ppt
Meenakshi Tripathi
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
Meenakshi Tripathi
 
Compact routing peleg paper
Compact routing peleg paperCompact routing peleg paper
Compact routing peleg paper
Meenakshi Tripathi
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
Meenakshi Tripathi
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovMeenakshi Tripathi
 

More from Meenakshi Tripathi (6)

Cryptoppt
CryptopptCryptoppt
Cryptoppt
 
Warmhole routing ppt
Warmhole routing pptWarmhole routing ppt
Warmhole routing ppt
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
 
Compact routing peleg paper
Compact routing peleg paperCompact routing peleg paper
Compact routing peleg paper
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by Krioukov
 

Recently uploaded

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 

Recently uploaded (20)

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 

Compactrouting

  • 1.
  • 2.  In Routing schemes there is trade-off between the Routing table size and stretch. Stretch of path p(u; v) from node u to node v is defined as |p(u; v) |/|d(u;v)| , where |d(u; v)| is the length of the shortest u-v path.  Naive Scheme : Each node holds the next hop to all nodes and employs optimal routing  Routing Table size is O(n log(n)) at each node where n : number of nodes  Stretch =1 ( optimum path)
  • 3. By this Compact Routing Method  Routing Table size bound - O(n2/3 log4/3 (n))  Maximum stretch ≤ 3
  • 4.  Nodes are connected with arbitrary weighted undirected edges  Reassign the node names in lexicographic order, with bound O(log(n))  Edges identified by port names, locally relevant  Concept of Landmark based routing
  • 5.  Re-Labeling of nodes  Storage in Routing Table  Routing Procedure
  • 6.  Every node name is represented as a  Triplet – ( orig. node name, name of its landmark, edge from landmark to the node) eg . V <- (v, lv, elv(v)) where elv(v) : is the edge from landmark to the node on shortest path, lv : Landmark of v
  • 7.  For each v ∈ V lv argminl∈L d(l; v) //closest landmark to node v  For each l ∈ L perform truncated-Dijkstra(nα )  For each v ∈ VL V <- (v; lv ; elv(v)) // the first link on the shortest path from lv to v
  • 8.  1) Extended Dominating Set – spans the neighborhood of all nodes in the network, obtained by Greedy Algorithm  2) Nodes in neighborhood of maximum nodes, selected as Landmark
  • 10.  Find set D, the Extended Dominating Set, using Greedy Algorithm (here α is a parameter s.t. 0<α <1) Ǝ D ⊂ V such that • |D| = O(n1-α log n) • ∀ v ∈V , D ∩ Bv ≠ φ Where Bv is the neighborhood of vertex ‘v’ of size nα  Find set C, set of nodes which lie in neighbourhood of maximum nodes C ⊂ V s.t. ∀ c ∈ C , |Rc| ≥ n(1+α)/2  Set of Landmarks, L =D ∪ C
  • 11.  For non-landmark nodes – information of neighbour and all landmarks is stored .  For landmarks - information of landmarks only is stored , otherwise routing table is huge at landmark
  • 12. //For neighbours of node v For each v ∈ V, perform truncated-Dijkstra(nα) For each u reached from v: If no landmark is on the path from v to u: store(v, eu(v)) at u // shortest paths from landmarks to every node For each l ∈ L, perform full-Dijkstra(nα) For each v ∈ V Store (l, eu(l)) at u
  • 13. V1 V2 V3 V4 V5 V6 V9 V7 V11 V10 V12 V8 NODE PORT V2 1 V4 1 V3 2 V10 2 1 1 2 3 1 2 2 1 V3 4 …. 4 1 2 3 neighbours landmarks
  • 14. At node u, a packet with destination (v; lv;elv(v)) is routed as –  If u=lv (landmark)-> route along elv(v).  If not, but (v; eu(v)) is in u's local routing table -> route along eu(v).  Else route along (lv ; eu(lv)).
  • 15.  A set of landmarks (L) is |L|= O(n1-α log n + n(1+α)/2)  If d(u; v) < d(lv ; v) then u is not a landmark and ∄ a landmark on the shortest path from u to v.  For each v, lv is among v's n closest neighbors.  For each x ≠ lv on the shortest path from lv to v, (x; ex(v)) is stored at x.
  • 16.  Let d(u; v) denote the length of the shortest path from u to v. Then the routing algorithm returns a path of length at most 3d(u; v).  The local storage space used at each node is O((n 1- α log n + n(1+α)/2) log n).  Using α = 1/3 + (2 log log n)/(3 log n), we get the bound for size as O(n2/3 log4/3 (n))
  • 17. By Mikkel Thorup & Uri Zwick
  • 18.  Suggests new routing for trees  Improvement of Routing Table size (in landmark based routing technique) from O(n2/3 log4/3 (n)) to O(n1/2 log(n)) for stretch 3  General Routing technique for Graphs
  • 19. Stretch Table Size Handshaking? 3 O(n1/2) no 5 O(n1/3) yes 7 O(n1/3) no 2k-1 O(n1/k) yes 4k-5 O(kn1/k) no New Routing Schemes Authors Stretch Table Size Cowen 3 O(n2/3) Eilam,Gavoille 5 O(n1/2) Awerbuch, Peleg O(k2) O(kn1/k) Awerbuch O(k29k) O(kn1/k) Previous Available Schemes
  • 20. Each vertex is assigned a (1+o(1))log2n–bit label. Given label(u) and label(v), it is possible to find, in constant time, the right edge to take from u. Similar result by Fraigniaud and Gavoille [ICALP’01] u v
  • 21. 4 5 6 1 2 3 8 10 9 11 7 12 DFS Enumeration of Nodes
  • 22. 1 2 3 4 5 6 8 7 9 10 11 1-2 3-11 Stretch=1 RT=O(d log n) Header= O(logn) d= degree(node) 12
  • 23. Single source shortest path routing:
  • 24.  Root the tree arbitrarily  Perform depth first enumeration of the vertices  let fw be the largest descendent of w  vertex v is descendent of w iff v ∈(w , fw)  else is sent to parent of w using parent pointer of w
  • 25.  O(log2n)-bit labels. Arbitrary port numbers. DFS numbering: For every vertex u, let fu be the largest descendant of u. Then v is a descendant of u iff 4 ],[ ufuv 1 2 10 113 65 12 1413 7 98 10 7 A trivial solution with O(deg(v)) memory.
  • 26.  Let s(v) be the number of descendants of v.  Let pv be the parent of v. Then, vertex v is heavy if s(v) s(pv)/2, and light otherwise. 14 8 2 17 1 41 3 11 3 11
  • 27. 0 1 2 2 3 3 4 The light-level lv of a vertex v is the number of light vertices on the path to it from the root. Claim: lv<log2n label(v)=(v,port(e1),port(e2),…) At v we store: (v, fv, hv, lv, port(v,pv) and port(v,hv)) e1 e2 e3 r v e4
  • 28.  Each vertex ‘v’ assigned (1+O(1))log2n-bit label  Label is the only information stored at the vertex  Label serves as header attached to messages sent to the vertex  Routing decision takes constant time
  • 29.  Weight sv of a vertex v is number of descendents in the tree  A child v’ is said to be heavy if sv’>sv/b Else light  Light level lv is def as the number of light vertices on the path from r to v  Enumerate tree in depth first order – where light vertices visited before heavy children  Routing information stored at v =(v,fv,hv,Hv,Pv) = O(b) words  hv is the first heavy child of v  Hv -> array of heavy children of v  Pv ->array of port no to parent & heavy nodes  < v0,v1,v2,….,vk> where v0=r and vi is the light nodes from r to node v , vk=v  LV=(port(vi1-1), port(vi2-1),……, port(vilv-1))= O(logbn)
  • 30.  Label(v)=(v , Lv)  At node w for header (v,Lv)  If w=v – done  Else if v ∈(w , fw) – if not not a descendent forward to parent of w using Pv[0]  Else if descendent check v ∈(hw , fw) – search Hw and get corresponding Pw  Else light descendent – search Lv[lw]  Eg. b=2  ((v>=w && v <h) ? L[1] : P[v>=h && v<=f])
  • 31.
  • 32. centA(v) = a center closest to v
  • 33. clusterA(v) = vertices that are closer to v than to all centers. cluster
  • 34.
  • 35. u vw For any w on the shortest path we have v clusterA(w).
  • 37.  We want A such that  |A|=O(n1/2)  clusterA(v)=O(n1/2), for every v  [Cowen does this with O(n2/3)]
  • 38.  Weight sv of a vertex v is the number of descendants in the tree  v’ is the heavy child & v0,v1,v2,….,vd-1 be its light children in decreasing order of weight  sv’>sv0>sv1>sv2>sv3>……>svd  All the strings are concatenated and stored, masking bits are to identify the lengths of each string  label(v)=(v,Lv,Mv)  Header size =3.4logn
  • 39.  Code(s)=s.bin(||s||,|s|).bin(||s||,||s||)  Label(v)=ID(v) + RT(v)  ID(v) consists of –  Binary representation of i, the index of heavy path containing v  String s corresponding to v¯ =v  ID(T; v) =ID(Tv ; v):code(i):code(sj ):code(port( v; v)) if v ≠ v, code(i):code(sj ) otherwise  Label(v) = code(ID(v)):code(RT(v)):code(pnt(v))
  • 40. Algorithm center(G) A ; W V; While W { A A choose(W,n1/2); W {w V | clusterA(w)>4n1/2 }; } Return A; The expected size of A is O(n1/2log n). Improvement over Cowen’s landmark based routing scheme
  • 41.  Use a hierarchy of centers.  Construct a tree cover of the graph.  Identify an appropriate tree from the cover and route on it. Generalized routing scheme
  • 42. Each vertex contained in at most n1/k trees. For every u,v, there is a tree with a path of stretch at most 2k-1 between them.
  • 43.  Table size = O(n1/k)  Label size = O(log n)  No handshaking ???