SlideShare a Scribd company logo
Compact Routing on Power Law
Graphs with Additive Stretch
-Arthur Brady & Lenore Cowen
Presented by ā€“ Meenakshi Tripathi
2bestpowerpointtemplates.com
BC Scheme
ā€¢ Compact Routing with Additive Stretch on power-law graphs.
ā€¢ Breaks graph into a dense core, of diameter d; the rest of the graph is
called the fringe.
ā€¢ Let e be the number of edges that need to be removed from the fringe to
make it into a forest.
ā€¢ Theorem. For any unweighted, undirected network, there is a routing
scheme that uses O(e log2
n)-bit headers and routing tables, and has
additive stretch d.
ā€¢ Node names are topology dependent.
ā€¢ Guarantees
ā€“ Additive stretch d
ā€“ Routing table sizes O(e log2
n)
BC Scheme
ā€“ find the highest-degree node in the graph (h)
ā€“ grow the shortest path tree rooted at it
ā€“ find the core, which is all nodes located within maximum distance d from
the highest degree node (I)
ā€“ grow small number (e) of trees to cover all the edges that do not belong
to the main tree and lie outside of the core (F)
ā€¢the larger d, the smaller e
ā€“ use known ultra-compact routing algorithms to route on these trees
ā€“ Constructed using a shortest path tree to route in the core, and e
spanning trees in the fringe, and a distance labeling to choose between
them.
3
Compact Routing on Trees
ļ¶ Given a tree T = (V,E), let TZT table[u] be the local routing
table assigned to vertex u & by TZT header[w] be the header
assigned to vertex w, by the Thorup-Zwick tree routing scheme on T.
ļ¶ Let dT (u, v) represent the length of the unique (u, v)-path in T.
ļ¶ By Peleg in tree T, each vertex v of T is assigned an O(log2
n)-bit
label lT(v), s.t. given the labels of any two vertices v,w in T, the
distance d(v,w) b/w them can be computed exactly
4
Routing Scheme in Tree
Let T = (V,E) be any tree with root r.
1.Initially, store a routing table TZT table[u] at each node u & let TZT
header[w] be the header of node w by TZ scheme.
2. For each vertex u, add the label lT (u) to TZT table[u] to form
TZā€™Ttable[u].
3. For each vertex v, add the label lT(v) to TZT header[v] to form
TZā€™Theader[v].
4. Routing decisions are same as the TZ tree-routing scheme
5
Routing Scheme in Tree
ā€¢ Lemma: TZā€™ uses O(log2
n)-bit headers, O(log2
n)- bit routing
tables, and allows any vertex u, given the header of any
destination v, to compute dT (u, v).
ā€¢ dT(u, v) can be computed from lT(u) and lT(v) by Peleg scheme
6
Routing Scheme in Tree
Define a set T of trees Ti to be the union of the following two sets:
1. a set of spanning trees {T' = T, T1, . . . , T|E'|} on G, constructed as follows:
ā€¢ i <āˆ’ 1.
ā€¢ For each edge uv āˆˆ Eā€™,
ā€“ Grow a single-source shortest path tree Ti rooted at u which includes uv.
ā€“ Increment i.
2. the connected components of TF , with each assigned an arbitrary root
vertex.
7
Routing Scheme in Tree
ā€¢ cfroute consists of four parts:
1)a preprocessing step, in which we construct temporary data structures using
TZā€™,
2) a labeling step, in which nodes are assigned Headers
3) a storage step, in which a local routing table is constructed at each node
4) the routing procedure
8
Routing Scheme in Tree
1) Preprocessing : Process each
tree Ti āˆˆ T using TZā€™. Let
TZā€™Titable[u]) be the routing table
for node u in tree Ti, and let
TZā€™Tiheader[v]) be the header
assigned to node u in tree Ti.
2) Labeling : Assign to each vertex v
a list of pairs (i, TZā€™Tiheader[v])
(ordered by increasing i), one for
every tree Ti which contains v.
3) Storage : The routing table stored
at each vertex u consists of a list
of pairs (i, TZā€™Titable[u]) (ordered
by increasing i), one for every tree
Ti which contains u
9
Routing Procedure
Given Source vertex u to a destination v, routing using cfroute
1.For each tree Ti containing both u and v, extract lTi (u) from
TZ'Titable[u], extract lTi(v) from TZā€™Tiheader[v] & compute dTi (u, v)
according to the Peleg scheme.
2. Choose some tree Tj such that dTj (u, v) is minimized.
3. Route from u to v in Tj according to TZā€™.
10
Analysis of the routing
procedure
If dTF(u, v) > d(u, v) i.e. āˆƒ edge uā€˜vā€™ āˆˆ P, āˆ‰ TF . Two cases exist ā€“
1. If u', v' āˆˆ F, then because u'v' āˆ‰ TF , u'v' āˆˆ E', so the preprocessing routine of
cfroute constructed a single-source
shortest path tree Ti spanning G with source uā€™ (or vā€™)
dTi (u, u')+dTi (u', v) = d(u, u')+d(u', v).
2. Now assume that u' āˆˆ I or v' āˆˆ I (or both) āˆ€ edges u'v' āˆˆ P which are not in TF .
P contains at least one vertex in I, so d(u, I) + d(I, v)<=|P| = d(u, v).
Hence dT (u, v) <= dT (u, h) +dT (h, v) <= [d(u, I)+ d/2 ]+[ d/2 +d(I, v)] <= d(u, v)+d.
11
Hybrid Scheme
ā€¢ Superimpose BC scheme and TZ scheme ā€“ hence a hybrid scheme
concatenate headers for both schemes, and store tables for both
schemes at every node.
ā€¢ Packet is routed using which results in a shorter path to its
destination
ā€¢ Better stretch than either the universal TZ scheme or BC scheme
Stretch is min{(1, d), (3, 0)} & RT size O(n1/2
log2
n) bits.
12
Results
13
Results
14
15
THANKS

More Related Content

Similar to Cowen2006 vrsn1

Chapter 24 aoa
Chapter 24 aoaChapter 24 aoa
Chapter 24 aoa
Hanif Durad
Ā 
Tree distance algorithm
Tree distance algorithmTree distance algorithm
Tree distance algorithm
Trector Rancor
Ā 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-i
Krish_ver2
Ā 
Transitions and Trajectories in Temporal Networks
Transitions and Trajectories in Temporal NetworksTransitions and Trajectories in Temporal Networks
Transitions and Trajectories in Temporal Networks
Moses Boudourides
Ā 
ds 10-Binary Tree.ppt
ds 10-Binary Tree.pptds 10-Binary Tree.ppt
ds 10-Binary Tree.ppt
khitishlpu
Ā 
Compactrouting
CompactroutingCompactrouting
Compactrouting
Meenakshi Tripathi
Ā 
Graphs
GraphsGraphs
Graphs
Saurabh Mishra
Ā 
Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...
Alexander Litvinenko
Ā 
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
csandit
Ā 
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
cscpconf
Ā 
Polyphase
PolyphasePolyphase
Polyphase
Adrita Chakraborty
Ā 
Review session2
Review session2Review session2
Review session2
NEEDY12345
Ā 
Logistics Management Assignment Help
Logistics Management Assignment Help Logistics Management Assignment Help
Logistics Management Assignment Help
Statistics Assignment Help
Ā 
Multi prefix trie
Multi prefix trieMulti prefix trie
Multi prefix trie
mehdi sa
Ā 
Data Structure and Algorithms Binary Tree
Data Structure and Algorithms Binary TreeData Structure and Algorithms Binary Tree
Data Structure and Algorithms Binary Tree
ManishPrajapati78
Ā 
Ppt 1
Ppt 1Ppt 1
Topological Sort
Topological SortTopological Sort
Topological Sort
Dr Sandeep Kumar Poonia
Ā 
Shortest path
Shortest pathShortest path
Shortest path
Farah Shaikh
Ā 
Temporal graph
Temporal graphTemporal graph
Temporal graph
Vinay Sarda
Ā 
Network Design Assignment Help
Network Design Assignment HelpNetwork Design Assignment Help
Network Design Assignment Help
Computer Network Assignment Help
Ā 

Similar to Cowen2006 vrsn1 (20)

Chapter 24 aoa
Chapter 24 aoaChapter 24 aoa
Chapter 24 aoa
Ā 
Tree distance algorithm
Tree distance algorithmTree distance algorithm
Tree distance algorithm
Ā 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-i
Ā 
Transitions and Trajectories in Temporal Networks
Transitions and Trajectories in Temporal NetworksTransitions and Trajectories in Temporal Networks
Transitions and Trajectories in Temporal Networks
Ā 
ds 10-Binary Tree.ppt
ds 10-Binary Tree.pptds 10-Binary Tree.ppt
ds 10-Binary Tree.ppt
Ā 
Compactrouting
CompactroutingCompactrouting
Compactrouting
Ā 
Graphs
GraphsGraphs
Graphs
Ā 
Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...
Ā 
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Ā 
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
Ā 
Polyphase
PolyphasePolyphase
Polyphase
Ā 
Review session2
Review session2Review session2
Review session2
Ā 
Logistics Management Assignment Help
Logistics Management Assignment Help Logistics Management Assignment Help
Logistics Management Assignment Help
Ā 
Multi prefix trie
Multi prefix trieMulti prefix trie
Multi prefix trie
Ā 
Data Structure and Algorithms Binary Tree
Data Structure and Algorithms Binary TreeData Structure and Algorithms Binary Tree
Data Structure and Algorithms Binary Tree
Ā 
Ppt 1
Ppt 1Ppt 1
Ppt 1
Ā 
Topological Sort
Topological SortTopological Sort
Topological Sort
Ā 
Shortest path
Shortest pathShortest path
Shortest path
Ā 
Temporal graph
Temporal graphTemporal graph
Temporal graph
Ā 
Network Design Assignment Help
Network Design Assignment HelpNetwork Design Assignment Help
Network Design Assignment Help
Ā 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
Ā 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
Ā 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
Ā 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
Ā 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
Ā 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
Ā 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
Ā 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
Ā 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
Ā 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
Ā 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
Ā 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-UniversitƤt
Ā 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
Ā 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
Ā 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
Ā 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
Ā 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
Ā 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
Ā 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
Ā 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
Ā 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Ā 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Ā 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Ā 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
Ā 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Ā 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Ā 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Ā 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Ā 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Ā 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ā 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Ā 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Ā 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Ā 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Ā 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Ā 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Ā 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
Ā 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Ā 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Ā 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Ā 

Cowen2006 vrsn1

  • 1. Compact Routing on Power Law Graphs with Additive Stretch -Arthur Brady & Lenore Cowen Presented by ā€“ Meenakshi Tripathi
  • 2. 2bestpowerpointtemplates.com BC Scheme ā€¢ Compact Routing with Additive Stretch on power-law graphs. ā€¢ Breaks graph into a dense core, of diameter d; the rest of the graph is called the fringe. ā€¢ Let e be the number of edges that need to be removed from the fringe to make it into a forest. ā€¢ Theorem. For any unweighted, undirected network, there is a routing scheme that uses O(e log2 n)-bit headers and routing tables, and has additive stretch d. ā€¢ Node names are topology dependent. ā€¢ Guarantees ā€“ Additive stretch d ā€“ Routing table sizes O(e log2 n)
  • 3. BC Scheme ā€“ find the highest-degree node in the graph (h) ā€“ grow the shortest path tree rooted at it ā€“ find the core, which is all nodes located within maximum distance d from the highest degree node (I) ā€“ grow small number (e) of trees to cover all the edges that do not belong to the main tree and lie outside of the core (F) ā€¢the larger d, the smaller e ā€“ use known ultra-compact routing algorithms to route on these trees ā€“ Constructed using a shortest path tree to route in the core, and e spanning trees in the fringe, and a distance labeling to choose between them. 3
  • 4. Compact Routing on Trees ļ¶ Given a tree T = (V,E), let TZT table[u] be the local routing table assigned to vertex u & by TZT header[w] be the header assigned to vertex w, by the Thorup-Zwick tree routing scheme on T. ļ¶ Let dT (u, v) represent the length of the unique (u, v)-path in T. ļ¶ By Peleg in tree T, each vertex v of T is assigned an O(log2 n)-bit label lT(v), s.t. given the labels of any two vertices v,w in T, the distance d(v,w) b/w them can be computed exactly 4
  • 5. Routing Scheme in Tree Let T = (V,E) be any tree with root r. 1.Initially, store a routing table TZT table[u] at each node u & let TZT header[w] be the header of node w by TZ scheme. 2. For each vertex u, add the label lT (u) to TZT table[u] to form TZā€™Ttable[u]. 3. For each vertex v, add the label lT(v) to TZT header[v] to form TZā€™Theader[v]. 4. Routing decisions are same as the TZ tree-routing scheme 5
  • 6. Routing Scheme in Tree ā€¢ Lemma: TZā€™ uses O(log2 n)-bit headers, O(log2 n)- bit routing tables, and allows any vertex u, given the header of any destination v, to compute dT (u, v). ā€¢ dT(u, v) can be computed from lT(u) and lT(v) by Peleg scheme 6
  • 7. Routing Scheme in Tree Define a set T of trees Ti to be the union of the following two sets: 1. a set of spanning trees {T' = T, T1, . . . , T|E'|} on G, constructed as follows: ā€¢ i <āˆ’ 1. ā€¢ For each edge uv āˆˆ Eā€™, ā€“ Grow a single-source shortest path tree Ti rooted at u which includes uv. ā€“ Increment i. 2. the connected components of TF , with each assigned an arbitrary root vertex. 7
  • 8. Routing Scheme in Tree ā€¢ cfroute consists of four parts: 1)a preprocessing step, in which we construct temporary data structures using TZā€™, 2) a labeling step, in which nodes are assigned Headers 3) a storage step, in which a local routing table is constructed at each node 4) the routing procedure 8
  • 9. Routing Scheme in Tree 1) Preprocessing : Process each tree Ti āˆˆ T using TZā€™. Let TZā€™Titable[u]) be the routing table for node u in tree Ti, and let TZā€™Tiheader[v]) be the header assigned to node u in tree Ti. 2) Labeling : Assign to each vertex v a list of pairs (i, TZā€™Tiheader[v]) (ordered by increasing i), one for every tree Ti which contains v. 3) Storage : The routing table stored at each vertex u consists of a list of pairs (i, TZā€™Titable[u]) (ordered by increasing i), one for every tree Ti which contains u 9
  • 10. Routing Procedure Given Source vertex u to a destination v, routing using cfroute 1.For each tree Ti containing both u and v, extract lTi (u) from TZ'Titable[u], extract lTi(v) from TZā€™Tiheader[v] & compute dTi (u, v) according to the Peleg scheme. 2. Choose some tree Tj such that dTj (u, v) is minimized. 3. Route from u to v in Tj according to TZā€™. 10
  • 11. Analysis of the routing procedure If dTF(u, v) > d(u, v) i.e. āˆƒ edge uā€˜vā€™ āˆˆ P, āˆ‰ TF . Two cases exist ā€“ 1. If u', v' āˆˆ F, then because u'v' āˆ‰ TF , u'v' āˆˆ E', so the preprocessing routine of cfroute constructed a single-source shortest path tree Ti spanning G with source uā€™ (or vā€™) dTi (u, u')+dTi (u', v) = d(u, u')+d(u', v). 2. Now assume that u' āˆˆ I or v' āˆˆ I (or both) āˆ€ edges u'v' āˆˆ P which are not in TF . P contains at least one vertex in I, so d(u, I) + d(I, v)<=|P| = d(u, v). Hence dT (u, v) <= dT (u, h) +dT (h, v) <= [d(u, I)+ d/2 ]+[ d/2 +d(I, v)] <= d(u, v)+d. 11
  • 12. Hybrid Scheme ā€¢ Superimpose BC scheme and TZ scheme ā€“ hence a hybrid scheme concatenate headers for both schemes, and store tables for both schemes at every node. ā€¢ Packet is routed using which results in a shorter path to its destination ā€¢ Better stretch than either the universal TZ scheme or BC scheme Stretch is min{(1, d), (3, 0)} & RT size O(n1/2 log2 n) bits. 12

Editor's Notes

  1. Forest is a disjoint union of trees ; undirected graphs all of whose connected components are trees; Internet, both at the router- and AS-levels, has: heavy-tailed degree distributions (power-laws) small average shortest path lengths, as a consequence strong clustering A routing algorithm is compact if (definition): Node address and packet header sizes scale polylogarithmically Routing table sizes scale sublinearly Stretch is a constant (does not grow with the network size at all!)
  2. The scheme is the first scheme specialized for scale-free graphs; The algorithms are essentially static Topology pre-processing (pre-computation) costs are not considered ; Not possible for planar graphs (Gavoille, Peleg, x); Estimates on the Inter-AS graph would give a worst-case additive stretch of 1&apos; (and average stretch much smaller). ; Exact distance labeling yield additive stretch compact routing schemes. A distance labeling is an assignment of short (polylog n)-bit strings to vertices so that given the labels of two vertices their exact (or approximate) distance can be inferred. Exact distance labeling schemes are known for graphs with small separators or separators with small diameter. Distributed implementations are possible, but the bounds for the number of messages they need to generate in order to process a topology change are not considered
  3. By Peleg in tree Twith uniform edge weights
  4. Either d TF (u, v) = d(u, v), or