Greedy Routing and Virtual Coordinates for Future Networks

Total Page:16

File Type:pdf, Size:1020Kb

Greedy Routing and Virtual Coordinates for Future Networks Greedy Routing and Virtual Coordinates for Future Networks Inauguraldissertation zur Erlangung der W¨urdeeines Doktors der Philosophie vorgelegt der Philosophisch-Naturwissenschaftlichen Fakult¨at der Universit¨atBasel von Ghazi Bouabene aus Tunesien Basel, 2012 Original document stored on the publication server of the University of Basel edoc.unibas.ch This work is licenced under the agreement Attribution Non-Commercial No Derivatives 2.5 Switzerland. The complete text may be viewed here: creativecommons.org/licenses/by-nc-nd/2.5/ch/deed.en Genehmigt von der Philosophisch-Naturwissenschaftlichen Fakult¨at auf Antrag von Prof. Dr. Christian F. Tschudin, Universit¨atBasel, Dissertationsleiter Prof. Dr. Guy Leduc, Universit´ede Li`ege,Korreferent Basel, den 18.09.2012 Prof. Dr. J¨orgSchibler, Dekan Attribution-Noncommercial-No Derivative Works 2.5 Switzerland You are free: to Share — to copy, distribute and transmit the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial. You may not use this work for commercial purposes. No Derivative Works. You may not alter, transform, or build upon this work. • For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this web page. • Any of the above conditions can be waived if you get permission from the copyright holder. • Nothing in this license impairs or restricts the author's moral rights. Your fair dealing and other rights are in no way affected by the above. This is a human-readable summary of the Legal Code (the full license) available in German: http://creativecommons.org/licenses/by-nc-nd/2.5/ch/legalcode.de Disclaimer: The Commons Deed is not a license. It is simply a handy reference for understanding the Legal Code (the full license) — it is a human-readable expression of some of its key terms. Think of it as the user-friendly interface to the Legal Code beneath. This Deed itself has no legal value, and its contents do not appear in the actual license. Creative Commons is not a law firm and does not provide legal services. Distributing of, displaying of, or linking to this Commons Deed does not create an attorney-client relationship. Quelle: http://creativecommons.org/licenses/by-nc-nd/2.5/ch/deed.en Datum: 3.4.2009 Abstract At the core of the Internet, routers are continuously struggling with ever-growing routing and forwarding tables. Although hardware ad- vances do accommodate such a growth, we anticipate new requirements e.g. in data-oriented networking where each content piece has to be referenced instead of hosts, such that current approaches relying on global information will not be viable anymore, no matter the hardware progress. In this thesis, we investigate greedy routing methods that can achieve similar routing performance as today but use much less resources and which rely on local information only. To this end, we add specially crafted name spaces to the network in which virtual coordinates repre- sent the addressable entities. Our scheme enables participating routers to make forwarding decisions using only neighbourhood information, as the overarching pseudo-geometric name space structure already orga- nizes and incorporates \vicinity" at a global level. A first challenge to the application of greedy routing on virtual coordinates to future networks is that of routing dead-ends that are local minima due to the difficulty of consistent coordinates attribu- tion. In this context, we propose a routing recovery scheme based on a multi-resolution embedding of the network in low-dimensional Euclidean spaces. The recovery is performed by routing greedily on a blurrier view of the network. The different network detail-levels are obtained though the embedding of clustering-levels of the graph. When compared with higher-dimensional embeddings of a given network, our method shows a significant diminution of routing failures for similar header and control- state sizes. A second challenge to the application of virtual coordinates and greedy routing to future networks is the support of \customer{provider" as well as \peering" relationships between participants, resulting in a differentiated services environment. Although an application of greedy routing within such a setting would combine two very common fields of today's networking literature, such a scenario has, surprisingly, not been studied so far. In this context we propose two approaches to address this scenario. In a first approach we implement a path-vector protocol similar to that of BGP on top of a greedy embedding of the network. This allows each node to build a spatial map associated with each of its neighbours indicating the accessible regions. Routing is then performed through the use of a decision-tree classifier taking the destination coordinates as input. When applied on a real-world dataset (the CAIDA 2004 AS graph) we demonstrate an up to 40% compression ratio of the routing control information at the network's core as well as a computationally efficient decision process comparable to methods such as binary trees and tries. In a second approach, we take inspiration from consensus-finding in social sciences and transform the three-dimensional distance data struc- ture (where the third dimension encodes the service differentiation) into a two-dimensional matrix on which classical embedding tools can be used. This transformation is achieved by agreeing on a set of constraints on the inter-node distances guaranteeing an administratively-correct greedy routing. The computed distances are also enhanced to encode multipath support. We demonstrate a good greedy routing performance as well as an above 90% satisfaction of multipath constraints when re- lying on the non-embedded obtained distances on synthetic datasets. As various embeddings of the consensus distances do not fully exploit their multipath potential, the use of compression techniques such as transform coding to approximate the obtained distance allows for bet- ter routing performances. Acknowledgements I would like to thank many people who contributed to this work in various ways. First, I would like to thank my advisor Prof. Dr. Christian Tschudin for the exploration freedom he gave me and for his confidence during the years. Also, I would like to thank Dr. Christophe Jelger with whom I had the chance to work during the first years of my Ph.D. Our close collaboration on the ANA EU project was not only fun, but also an occasion to revisit the basics of computer communications, from both a design and a software point of view. A special thanks goes also to Dr. Manolis Sifalakis with whom I had the chance to collaborate during the last years of my Ph.D. His tireless positive thinking helped me concretize many of the ideas presented in this work. I would also like to thank the following colleagues, for some, close friends, for making this journey memorable and fun: Paola Ranaldi, Diego Milano, Marcel L¨uthi, Michael Springmann, Nenad Stojnic, David Adametz, Ihab Al Kabary, Julia Vogt, Matthias Amberg and Filip Brink- mann. Some of the lunch time discussions we had are simply unforget- table. On the private side, I would like to thank Simone Haselier for shar- ing this journey with me, and I am very grateful to my parents and my brothers for their love and caring advice. Contents 1 Introduction 1 1.1 Definition of greedy routing on virtual coordinates . .3 1.2 The power of geometric virtual coordinates . .4 1.2.1 Virtual coordinates as an evolution tool . .5 1.2.2 Applications of virtual coordinates and vector spaces9 1.3 Challenges to the deployment of greedy routing on virtual coordinates in future networks . 11 1.4 Summary of contributions . 14 2 Obtaining Coordinates for Greedy Routing 15 2.1 Theoretical approaches to the problem of virtual coordi- nates attribution . 16 2.1.1 Distance labelling techniques . 16 2.1.2 Geometric Approaches . 20 2.2 Embedding techniques in the networking literature . 36 2.2.1 Tree and hierarchical-based techniques . 37 2.2.2 Distance labelling and compact routing techniques 39 2.2.3 Graph drawing techniques . 40 2.2.4 Lipschitz based techniques . 41 2.2.5 Hyperbolic space techniques . 43 2.2.6 Graph sampling techniques and the revival of trees 44 2.3 Summary . 45 3 on Guaranteeing packet delivery in greedy routing 47 3.1 Introduction . 48 3.2 Greedy Routing Dead-End Problem . 49 3.3 Related work . 53 3.4 A cluster-based approach . 56 vii viii Contents 3.4.1 Construction of a cluster graph . 58 3.4.2 Cluster graph embedding . 59 3.4.3 Cluster-level state . 60 3.4.4 Operation of greedy routing . 61 3.4.5 Multiple cluster levels . 62 3.5 Evaluation . 63 3.5.1 Experimental set-up . 63 3.5.2 Clustering algorithm used for the tests . 64 3.5.3 Greedy routing performance . 64 3.5.4 State overhead for clustering . 69 3.6 Discussion . 70 3.6.1 On the general effects of clustering . 70 3.6.2 Clustering versus inter-domain routing . 72 3.7 Conclusion . 73 4 Greedy Routing and administrative policies 75 4.1 Introduction . 76 4.2 Administrative relationships and policies . 77 4.2.1 Security policies . 78 4.2.2 Traffic policies . 78 4.2.3 Administrative relationships and policies . 78 4.3 Administrative policies and future networks . 82 4.3.1 Administrative policies and greedy routing . 82 4.4 The problem from a graph viewpoint . 85 4.4.1 Relation to social sciences and Cognitive Social Structures . 88 4.5 Understanding the problem from a distance matrix view- point............................
Recommended publications
  • Distributed Computation of Virtual Coordinates for Greedy Routing in Sensor Networks
    Discrete Applied Mathematics ( ) – Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Distributed computation of virtual coordinates for greedy routing in sensor networks Mirela Ben Chen a, Steven J. Gortler b, Craig Gotsman a,∗, Camille Wormser c a Technion, Haifa, Israel b Harvard University, United States c INRIA, France article info a b s t r a c t Article history: Sensor networks are emerging as a paradigm for future computing, but pose a number Available online xxxx of challenges in the fields of networking and distributed computation. One challenge is to devise a greedy routing protocol—one that routes messages through the network using Keywords: only information available at a node or its neighbors. Modeling the connectivity graph Sensor network of a sensor network as a 3-connected planar graph, we describe how to compute on the Routing network in a distributed and local manner a special geometric embedding of the graph. Graph embedding This embedding supports a geometric routing protocol called ``greedy routing'' based on the ``virtual'' coordinates of the nodes derived from the embedding. ' 2010 Elsevier B.V. All rights reserved. 1. Introduction Sensor networks are a collection of (usually miniature) devices, each with limited computing and wireless communica- tion capabilities, distributed over a physical area. The sensor network collects data from its environment and should be able to integrate it and answer queries related to this data. Sensor networks are becoming more and more attractive in many application domains. The advent of sensor networks has posed a number of research challenges to the networking and distributed computation communities.
    [Show full text]
  • Succinct Greedy Graph Drawing in the Hyperbolic Plane
    Succinct Greedy Graph Drawing in the Hyperbolic Plane David Eppstein1 and Michael T. Goodrich2 Computer Science Department, University of California, Irvine, USA. Abstract. We describe an efficient method for drawing any n-vertex simple graph G in the hyperbolic plane. Our algorithm produces greedy drawings, which support greedy geometric routing, so that a message M between any pair of vertices may be routed geometrically, simply by having each vertex that receives M pass it along to any neighbor that is closer in the hyperbolic metric to the message’s eventual destination. More importantly, for networking applications, our algorithm produces succinct drawings, in that each of the vertex positions in one of our embeddings can be represented using O(log n) bits and the calculation of which neighbor to send a message to may be performed efficiently using these representations. These properties are useful, for example, for routing in sensor networks, where storage and bandwidth are limited. 1 Introduction One of the richest modern applications of algorithmic graph theory is in networking, and one of the most important algorithmic problems in networking is routing. In this problem, we are given an n-vertex graph G representing a communication network, where each vertex in G is a computational agent, such as a sensor, smart phone, base station, PC, or workstation, and the edges in G represent communication channels. The routing problem is to set up an efficient means to support message passing between the vertices in G. The traditional way to do routing is via protocols, such as in the link-state/OSPF or distance-vector/RIP protocols (e.g., see [5, 25]), that set up routing tables for each vertex v in G.
    [Show full text]
  • Graph Embeddings Motivated by Greedy Routing
    Graph Embeddings Motivated by Greedy Routing zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften von der KIT-Fakultät für Informatik des Karlsruher Instituts für Technologie (KIT) genehmigte Dissertation von Roman Prutkin aus Ekaterinburg Tag der mündlichen Prüfung: 29. November 2017 Erster Gutachter: Prof. Dr. Dorothea Wagner Zweiter Gutachter: Prof. Dr. Martin Nöllenburg Dritter Gutachter: Prof. Dr. Michael Kaufmann Roman Prutkin: Graph Embeddings Motivated by Greedy Routing, © 21. Februar 2018 To my family DANKSAGUNG Als Erstes möchte ich mich bei Dorothea Wagner bedanken für die Möglichkeit, an ihrem Lehrstuhl meiner Promotion nachzugehen. Ich weiß es sehr zu schätzen, dass ich ohne Zeitdruck und unter äußerst komfortablen Rahmenbedingungen Forschungsfragen untersuchen konnte, die mich interessieren. Bei der Wahl der Forschungsthemen war ich immer frei und bekam von Dorothea stets Rat und Unterstützung. Michael Kaufmann danke ich, dass er sich bereit erklärt hat, meine Disserta- tion zu begutachten, sowie für seine Flexibilität bei der Terminfindung für die Promotionsprüfung. Martin Nöllenburg und Ignaz Rutter haben mich sowohl bei meiner Diplom- arbeit als auch während meiner Promotion hervorragend betreut. Ich bin sehr froh, dass ich von eurem Fachwissen und Erfahrung profitieren und von euch viel lernen konnte. Die Zusammenarbeit mit euch hat mir Spaß gemacht. Ich bedanke mich bei meinen Koautoren Therese Biedl, Thomas Bläsius, Xiaoji Chen, Carsten Dachsbacher, Fabian Fuchs, Alexander E. Holroyd, Anton Kapla-
    [Show full text]
  • Some Results on Greedy Embeddings in Metric Spaces
    Some Results on Greedy Embeddings in Metric Spaces Tom Leighton Ankur Moitra ∗ Massachusetts Institute of Technology Massachusetts Institute of Technology Math Department and CSAIL EECS Department and CSAIL Cambridge, MA 02139 Cambridge, MA 02139 [email protected] [email protected] Abstract Geographic Routing is a family of routing algorithms that uses geographic point locations as addresses for the purposes of routing. Such routing algorithms have proven to be both simple to implement and heuristically effective when applied to wireless sensor networks. Greedy Routing is a natural abstraction of this model in which nodes are assigned virtual coordinates in a metric space, and these coordinates are used to perform point-to-point routing. Here we resolve a conjecture of Papadimitriou and Ratajczak that every 3-connected planar graph admits a greedy embedding into the Euclidean plane. This immediately implies that all 3-connected graphs that exclude K3;3 as a minor admit a greedy embedding into the Euclidean plane. We also prove a combinatorial condition that guarantees non-embeddability. We use this result to construct graphs that can be greedily embedded into the Euclidean plane, but for which no spanning tree admits such an embedding. 1 Introduction 1.1 Background The study of routing has a long and rich history. But for many important classes of routing problems, routing schemes that are both simple and provably effective have so far been elusive. In particular, scalable wireless sensor networks require point-to-point communication but such ad-hoc networks admit no global hierarchical addressing scheme and there are still no broadly accepted, scalable point-to-point routing schemes despite numerous propos- als.
    [Show full text]
  • A Geometric Routing Scheme in Word-Metric Spaces for Data Networks
    A GEOMETRIC ROUTING SCHEME IN WORD- METRIC SPACES FOR DATA NETWORKS Miguel Hernando Camelo Botero Dipòsit legal: Gi. 1844-2014 http://hdl.handle.net/10803/283749 ADVERTIMENT. L'accés als continguts d'aquesta tesi doctoral i la seva utilització ha de respectar els drets de la persona autora. Pot ser utilitzada per a consulta o estudi personal, així com en activitats o materials d'investigació i docència en els termes establerts a l'art. 32 del Text Refós de la Llei de Propietat Intel·lectual (RDL 1/1996). Per altres utilitzacions es requereix l'autorització prèvia i expressa de la persona autora. En qualsevol cas, en la utilització dels seus continguts caldrà indicar de forma clara el nom i cognoms de la persona autora i el títol de la tesi doctoral. No s'autoritza la seva reproducció o altres formes d'explotació efectuades amb finalitats de lucre ni la seva comunicació pública des d'un lloc aliè al servei TDX. Tampoc s'autoritza la presentació del seu contingut en una finestra o marc aliè a TDX (framing). Aquesta reserva de drets afecta tant als continguts de la tesi com als seus resums i índexs. ADVERTENCIA. El acceso a los contenidos de esta tesis doctoral y su utilización debe respetar los derechos de la persona autora. Puede ser utilizada para consulta o estudio personal, así como en actividades o materiales de investigación y docencia en los términos establecidos en el art. 32 del Texto Refundido de la Ley de Propiedad Intelectual (RDL 1/1996). Para otros usos se requiere la autorización previa y expresa de la persona autora.
    [Show full text]
  • Succinct Greedy Graph Drawing in the Hyperbolic Plane
    Succinct Greedy Graph Drawing in the Hyperbolic Plane David Eppstein1 and Michael T. Goodrich2 Computer Science Department, University of California, Irvine, USA. Abstract. We describe an efficient method for drawing any n-vertex simple graph G in the hyperbolic plane. Our algorithm produces greedy drawings, which support greedy geometric routing, so that a message M between any pair of vertices may be routed geometrically, simply by having each vertex that receives M pass it along to any neighbor that is closer in the hyperbolic metric to the message’s eventual destination. More importantly, for networking applications, our algorithm produces succinct drawings, in that each of the vertex positions in one of our embeddings can be represented using O(log n) bits and the calculation of which neighbor to send a message to may be performed efficiently using these representations. These properties are useful, for example, for routing in sensor networks, where storage and bandwidth are limited. 1 Introduction One of the richest modern applications of algorithmic graph theory is in networking, and one of the most important algorithmic problems in networking is routing. In this problem, we are given an n-vertex graph G representing a communication network, where each vertex in G is a computational agent, such as a sensor, smart phone, base station, PC, or workstation, and the edges in G represent communication channels. The routing problem is to set up an efficient means to support message passing between the vertices in G. The traditional way to do routing is via protocols, such as in the link-state/OSPF or distance-vector/RIP protocols (e.g., see [5, 25]), that set up routing tables for each vertex v in G.
    [Show full text]
  • Greedy Routing with Bounded Stretch
    Greedy Routing with Bounded Stretch Roland Flury Sriram V. Pemmaraju Roger Wattenhofer ETH Zurich, Switzerland The University of Iowa, USA ETH Zurich, Switzerland rfl[email protected] [email protected] [email protected] Abstract—Greedy routing is a novel routing paradigm where of geo-routing is greedy routing, where each node simply messages are always forwarded to the neighbor that is closest to forwards a message to the neighbor closest to the destination. the destination. Our main result is a polynomial-time algorithm Greedy routing has many advantages, in particular it com- that embeds combinatorial unit disk graphs (CUDGs – a CUDG is a UDG without any geometric information) into O(log2n)- pletely abstains from the concept of routing tables (and may dimensional space, permitting greedy routing with constant be viewed as “routing without routers”), rendering routing stretch. To the best of our knowledge, this is the first greedy ultimately scalable! However, there are three problems with embedding with stretch guarantees for this class of networks. greedy routing: Our main technical contribution involves extracting, in polyno- mial time, a constant number of isometric and balanced tree (i) The first problem is that the geographic location of a separators from a given CUDG. We do this by extending the mobile destination may not be known. One possible so- celebrated Lipton-Tarjan separator theorem for planar graphs lution to approach this problem may be through location to CUDGs. Our techniques extend to other classes of graphs; service protocols [1,15], which are essentially geometric for example, for general graphs, we obtain an O(log n)-stretch greedy embedding into O(log2n)-dimensional space.
    [Show full text]
  • Proceedings Chapter Reference
    Proceedings Chapter Greedy Routing on Virtual Raw Anchor Coordinate (VRAC) System LEONE, Pierre, SAMARASINGHE, Kasun Abstract Geographic routing is an appealing routing strategy that uses the location information of the nodes to route the data. This technique uses only local information of the communication graph topology and does not require computational effort to build routing table or equivalent data structures. A particularly efficient implementation of this paradigm is greedy routing, where along the data path the nodes forward the data to a neighboring node that is closer to the destination. The decreasing distance to the destination implies the success of the routing scheme. A related problem is to consider an abstract graph and decide whether there exists an embedding of the graph in a metric space, called a greedy embedding, such that greedy routing guarantees the delivery of the data. A common approach to assign geographic coordinates is to measure distances (for instance the distances between neighboring nodes) and compute (virtual) coordinates. The rationale of the Virtual raw Anchor Coordinate System (VRAC) is to use the (raw) measured distances as coordinates in order to avoid further computations. More precisely, each node needs [...] Reference LEONE, Pierre, SAMARASINGHE, Kasun. Greedy Routing on Virtual Raw Anchor Coordinate (VRAC) System. In: International Conference on Distributed Computing in Sensor Systems. IEEE, 2016. DOI : 10.1109/DCOSS.2016.21 Available at: http://archive-ouverte.unige.ch/unige:87830 Disclaimer: layout of this document may differ from the published version. 1 / 1 Greedy Routing on Virtual Raw Anchor Coordinate (VRAC) System Pierre Leone and Kasun Samarasinghe Centre Universitaire d’Informatique University of Geneva Switzerland fpierre.leone,[email protected] Abstract—Geographic routing is an appealing routing strategy hence alternative mechanisms are required to guarantee the that uses the location information of the nodes to route the data.
    [Show full text]
  • Graph Theory, an Antiprism Graph Is a Graph That Has One of the Antiprisms As Its Skeleton
    Graph families From Wikipedia, the free encyclopedia Chapter 1 Antiprism graph In the mathematical field of graph theory, an antiprism graph is a graph that has one of the antiprisms as its skeleton. An n-sided antiprism has 2n vertices and 4n edges. They are regular, polyhedral (and therefore by necessity also 3- vertex-connected, vertex-transitive, and planar graphs), and also Hamiltonian graphs.[1] 1.1 Examples The first graph in the sequence, the octahedral graph, has 6 vertices and 12 edges. Later graphs in the sequence may be named after the type of antiprism they correspond to: • Octahedral graph – 6 vertices, 12 edges • square antiprismatic graph – 8 vertices, 16 edges • Pentagonal antiprismatic graph – 10 vertices, 20 edges • Hexagonal antiprismatic graph – 12 vertices, 24 edges • Heptagonal antiprismatic graph – 14 vertices, 28 edges • Octagonal antiprismatic graph– 16 vertices, 32 edges • ... Although geometrically the star polygons also form the faces of a different sequence of (self-intersecting) antiprisms, the star antiprisms, they do not form a different sequence of graphs. 1.2 Related graphs An antiprism graph is a special case of a circulant graph, Ci₂n(2,1). Other infinite sequences of polyhedral graph formed in a similar way from polyhedra with regular-polygon bases include the prism graphs (graphs of prisms) and wheel graphs (graphs of pyramids). Other vertex-transitive polyhedral graphs include the Archimedean graphs. 1.3 References [1] Read, R. C. and Wilson, R. J. An Atlas of Graphs, Oxford, England: Oxford University Press, 2004 reprint, Chapter 6 special graphs pp. 261, 270. 2 1.4. EXTERNAL LINKS 3 1.4 External links • Weisstein, Eric W., “Antiprism graph”, MathWorld.
    [Show full text]