two techniques for fast computation uml diagrams download
#1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 105
Two Techniques for Fast Computation of
Constrained Shortest Paths
Shigang Chen, Member, IEEE, Meongchul Song, Member, IEEE, and Sartaj Sahni, Fellow, IEEE
Abstract—Computing constrained shortest paths is fundamental
to some important network functions such as QoS routing, MPLS
path selection, ATM circuit routing, and traffic engineering. The
problem is to find the cheapest path that satisfies certain constraints.
In particular, finding the cheapest delay-constrained path
is critical for real-time data flows such as voice/video calls. Because
it is NP-complete, much research has been designing heuristic
algorithms that solve the -approximation of the problem with
an adjustable accuracy. A common approach is to discretize (i.e.,
scale and round) the page link delay or page link cost, which transforms the
original problem to a simpler one solvable in polynomial time.
The efficiency of the algorithms directly relates to the magnitude
of the errors introduced during discretization. In this paper, we
propose two techniques that reduce the discretization errors,
which allows faster algorithms to be designed. Reducing the
overhead of computing constrained shortest paths is practically
important for the successful design of a high-throughput QoS
router, which is limited at both processing power and memory
space. Our simulations show that the new algorithms reduce the
execution time by an order of magnitude on power-law topologies
with 1000 nodes. The reduction in memory space is similar.
Index Terms—Approximation algorithms, constrained shortest
paths, QoS routing.
I. INTRODUCTION
AMAJOR obstacle against implementing distributed
multimedia applications (e.g., web broadcasting, video
teleconferencing, and remote diagnosis) is the difficulty of ensuring
quality of service (QoS) over the Internet. A fundamental
problem that underlies many important network functions such
as QoS routing, MPLS path selection, and traffic engineering,
is to find the constrained shortest path—the cheapest path that
satisfies a set of constraints [1]–[10]. For interactive real-time
traffic, the delay-constrained least-cost path has particular
importance [11]. It is the cheapest path whose end-to-end delay
is bounded by the delay requirement of a time-sensitive data
flow. The additional bandwidth requirement, if there is one, can
be easily handled by a pre-processing step that prunes the links
without the required bandwidth from the graph.
The algorithms for computing the constrained shortest paths
can be used in many different circumstances, for instance,
laying out virtual circuits in ATM networks, establishing wavelength-
switching paths in fiber-optics networks, constructing
Manuscript received November 7, 2005; revised October 16, 2006; approved
by IEEE/ACM TRANSACTIONS ON NETWORKING Editor A. Orda.
S. Chen and S. Sahni are with the Department of Computer and Information
Science and Engineering, University of Florida, Gainesville, FL 32611 USA
(e-mail: sgchen[at]cise.ufl.edu; sahni[at]cise.ufl.edu).
M. Song is with the Systems R&D Laboratories, Samsung Electronics Company,
Ltd., Gyeonggi-do 443-742, Korea (e-mail: meong.song[at]samsung.com).
Digital Object Identifier 10.1109/TNET.2007.897965
label-switching paths in MPLS based on the QoS requirements
in the service contracts, or applying together with RSVP. There
are two schemes of implementing the QoS routing algorithms
on routers. The first scheme is to implement them as on-line
algorithms that process the routing requests as they arrive.
In practice, on-line algorithms are not always desired. When
the request arrival rate is high (major gateways may receive
thousands or tens of thousands of requests every second), even
the time complexity of Dijkstra’s algorithm will overwhelm
the router if it is executed on a per-request basis.1 To solve
this problem, the second scheme is to extend a link-state protocol
(e.g., OSPF) and periodically pre-compute the cheapest
delay-constrained paths for all destinations, for instance, for
voice traffic with an end-to-end delay requirement of 100 ms.
The computed paths are cached for the duration before the
next computation. This approach provides support for both
constrained unicast and constrained multicast. The computation
load on a router is independent of the request arrival rate. Moreover,
many algorithms, including those we will propose shortly,
have the same time complexity for computing constrained
shortest paths to all destinations or to a single destination. This
paper studies the second scheme.
A path that satisfies the delay requirement is called a feasible
path. Finding the cheapest (least-cost) feasible path is NP-complete.
There has been considerable work in designing heuristic
solutions for this problem. Xue [12] and Juttner et al. [13] used
the Lagrange relaxation method to approximate the delay-constrained
least-cost routing problem. However, there is no theoretical
bound on how large the cost of the found path can be.
Korkmaz and Krunz used a nonlinear target function to approximate
the multi-constrained least-cost path problem [14]. It was
proved that the path that minimizes the target function satisfies
one constraint and the other constraints multiplied by ,
where is a predefined constant and is the number of constraints.
However, no known algorithm can find such a path
in polynomial time. Ref. [14] proposed a heuristic algorithm,
which has the same time complexity as Dijkstra’s algorithm. It
does not provide a theoretical bound on the property of the returned
path, nor provide conditional guarantee in finding a feasible
path when one exists. In addition, because the construction
of the algorithm ties to a particular destination, it is not suitable
for computing constrained paths from one source to all destinations.
For this task, it is slower than the algorithms proposed in
this paper by two orders of magnitude based on our simulations.
Another thread of research in this area is to design polynomial
time algorithms that solves the NP-complete problem with
1Note that path caching does not eliminate the problem of finding constrained
shortest paths because those paths must be calculated before being cached.
1063-6692/$25.00 © 2008 IEEE
106 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008
an accuracy that is theoretically bounded. Let and be the
number of links and the number of nodes in the network, respectively.
Given a small constant , Hassin’s algorithm [15]
has a time complexity of , where
UB and LB are the costs of the fastest path and the cheapest path
from the source node to the destination node, respectively. The
algorithm finds a feasible path if there exists one. The cost of the
path is within the cost of the cheapest feasible path multiplied
by . Lorenz and Raz improved the time complexity to
[16]. Chen and Nahrstedt solved a similar
problem in time , where in order
to achieve the -approximation [17]. Goel et al.’s algorithm
[18] has the best-known complexity of ,
where is the length (hops) of the longest path in the network.
However, its approximation model is different. It computes a
path whose cost is no more than the cost of the cheapest feasible
path, while the delay of the path is within of the
delay requirement. The algorithms proposed in this paper follow
Goel’s model.
One common technique of the above algorithms [15], [17],
[18] is to discretize the page link delay (or page link cost). Due to the discretization,
the possible number of different delay values (or
cost values) for a path is reduced, which makes the problem
solvable in polynomial time. The effectiveness of this technique
depends on how much error is introduced during the discretization.
The existing discretization approaches have either positive
discretization error for every page link or negative error for every
link. Therefore, the discretization error on a path is statistically
proportional to the path length as the errors on the links along
the path add up. In order to bound the maximum error, the discretization
has to be done at a fine level, which leads to high
execution time of the algorithms.
Given the limited resources and ever-increasing tasks of the
routers, it is practically important to improve the efficiency of
the network functions. While QoS routing is expensive due
to its nonlinear nature, it has particular significance to reduce
the router’s overhead in computing the constrained shortest
paths. In this paper, we propose two techniques, randomized
discretization and path delay discretization, which reduce the
discretization errors and allow faster algorithms to be designed.
The randomized discretization cancels out the page link errors along
a path. The larger the topology, the greater the error reduction.
The path delay discretization works on the path delays instead
of the individual page link delays, which eliminates the problem
of error accumulation. Based on these techniques, we design
fast algorithms to solve the -approximation of the constrained
shortest-path problem. We prove the correctness and complexities
of the algorithms. Although the new algorithms have the
same worst-case complexity as Goel et al.’s algorithm [18],
we believe (and our simulations suggest) that they run much
faster on the average case. The simulations show that the new
algorithms are faster than Goel et al.’s algorithm by an order of
magnitude on power-law topologies with 1000 nodes.
The rest of the paper is organized as follows. Section II reviews
the existing approaches. Section III describes the randomized
discretization, and Section IV describes the path delay discretization.
Sections V and VI provide analytical and simulation
results, respectively. Section VII draws the conclusion.
II. PROBLEM DEFINITION AND EXISTING
DISCRETIZATION APPROACHES
Consider a network , where is a set of nodes and
is a set of directed links connecting the nodes. The delay
and the cost of a page link are denoted as and
, respectively. The delay and the cost of a path are denoted
as and , respectively. ,
and . Let be the length (number
of hops) of , and be the length of the longest path in the
network.
Given a delay requirement , is called a feasible path if
. Given a source node , let be the set of nodes
to which there exist feasible paths from . For any , the
cheapest feasible path from to is defined as
The delay-constrained least-cost routing problem (DCLC) is
to find the cheapest feasible paths from to all nodes in ,
which is NP-complete [19]. However, if the page link delays are all
integers and the delay requirement is bounded by an integer
, the problem can be solved in time by
Joksch’s dynamic programming algorithm [20] or the extended
Dijkstra’s algorithm [17].
Joksch’s algorithm is described as follows.
, let be a variable storing the cost of the cheapest
path from to with , and storing the last
link of the path. Initially, , and .
NIL. Assuming that all page link delays are positive, the
dynamic programming is given below.
Now suppose the page link delays are allowed to be zero. We need
to add one more step. Let be the subgraph consisting of all
zero-delay links. For each , immediately after Joksch’s
algorithm calculates , Dijkstra’s algorithm is
executed on to improve on zero-delay paths [18].
The above polynomially solvable special case with integer
delays points out a heuristic solution for the general NP-complete
problem with arbitrary delays. The idea is to discretize
(scale and then round) arbitrary page link delays to integers [15],
[17], [18], [21]. There are two existing discretization approaches,
round to ceiling [17] and round to floor [18]. Both
approaches map the delay requirement to a selected integer
, and then discretize the page link delays as follows.
Round to ceiling (RTC): For every page link , the delay
value is divided by . If the result is not an integer, it is
rounded to the nearest larger integer.
(1)
CHEN et al.: TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS 107
Round to floor (RTF): For every page link , the delay value
is divided by . If the result is not an integer, it is rounded to
the nearest smaller integer.
(2)
The value of controls the rounding error (up to ) introduced
by discretization. With a larger , the rounding error
accounts for a smaller portion of the page link delay. When is large
enough and thus the discretization error is small enough, we can
approximate the DCLC problem by a new problem with integer
delays after discretization. The solution to the new problem will
serve as the solution of the original problem. However the computation
overhead is directly related to .
After discretizing the page link delays by RTC or RTF, either
Joksch’s algorithm or the extended Dijkstra’s algorithm can
solve the -approximation of DCLC, which is to find a path
for every node , such that
where is a small percentage. The delay of the path is allowed to
exceed the requirement by a percentage of no more than , while
the cost should be no more than that of the cheapest feasible
path . Using RTF, the delay scaling algorithm (DSA) proposed
by Goel et al. achieves the best time complexity
among all existing algorithms [18].
The discretization error of a page link is defined as
(3)
(4)
The discretization error of a path is defined as
(5)
(6)
By (1), we know that is true for all links .
Therefore, is true for all paths . Similarly, by (4),
and are always true.
III. RANDOMIZED DISCRETIZATION
RTC creates negative rounding errors on links. The error accumulates
along a path. The accumulated error is proportional to
the path length. The larger the topology, the longer a path, the
larger the accumulated error. The same thing is true for RTF,
which has positive rounding errors on links. In order to achieve
-approximation, the accumulated error on a path cannot be too
large. To reduce the error on a path, the existing algorithms
based on RTC or RTF must reduce the discretization errors on
the links by using a large value. Given the time complexity
, the computation time is increased in proportion
to .
The insight is that if we can reduce the error introduced by
discretization without using a larger , we can improve the performance
of the algorithm.We develop two newtechniques. The
first one is called randomized discretization. It rounds to ceiling
or to floor according to certain probabilities. The idea is for some
links to have positive errors and some links to have negative errors.
Positive errors and negative errors cancel out one another
along a path in such a way that the accumulated error is minimized
statistically. We will prove that, when the following discretization
approach is used, the mean of the accumulated error
on a path is zero and the standard deviation is bounded by
. In comparison, the mean of the accumulated error
is for RTC and for RTF.
Round randomly (RR): For every page link , the delay value
is divided by . If the result is not an integer, it is rounded
to the nearest smaller integer or to the nearest larger integer
randomly such that the mean error is zero.
with prob.
with prob.
(7)
The discretized delay of a path is
(8)
The discretization error of a page link is
(9)
and the discretization error of a path is
(10)
We design the randomized discretization algorithm (RDA),
which is based on Dijkstra’s algorithm but considers two additive
metrics, delay and cost. It uses RR to discretize the page link delays.
We will prove that it solves the -approximation of DCLC.
The pseudo code of RDA is given below. A two-dimensional
array, , , , stores the cost of the cheapest
path from to with . Another two dimensional
array, , stores the last page link of the path. An auxiliary two-dimensional
array, , keeps track of the minimum discretization
error on paths whose discretized delays are from node
to node .
Given any value of , computes
and . For any destination , the function finds the
cheapest paths at different path delays, . Let
be the cheapest among these paths. iteratively calls
RDA_Dijkstra with an increasing until the delay of is
smaller than for all .
RDA assumes a preprocessing step that removes all nodes to
which there are no feasible paths from . This step can be done
108 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008
by calling Dijkstra’s algorithm because only one metric (delay)
is considered.
1. for each vertex , each do
2. , NIL,
3. ,
4.
5.
6. if then
7.
8.
9. if and then
10.
11.
12.
13.
14. for to do
15.
16. while do
17.
18. if then
19. break out of the while loop
20. for every adjacent node of do
21.
22.
23. do
24.
25.
26. while ,
where is the path with
The correctness of the algorithm is given in the theorem
below. The proof can be found in Appendix I.
Theorem 1: RDA solves the -approximation of DCLC in
time .
RDA has the same worst-case time complexity as DSA [18],
which uses RTF. The reason is that, in the worst case, it could
happen that for all links , which
makes RR identical to RTF. But such occurrence is extremely
unlikely. More important than the worst-case complexity is the
average-case running time of the algorithm. By its nature, RR is
a statistical approach. It does not improve the performance of the
algorithm for the rare worst case when round-to-floor happens
at all links, but it improves for an average case where round-tofloor
and round-to-ceiling happen probabilistically as specified
in (7). Because positive errors and negative errors cancel out
each other along a path, RDA requires a much smaller to complete
than DSA, which accumulates positive errors on a path.
Consequently, RDA runs much faster than DSA on average,
which will be evident from our analytical and simulation results.
IV. PATH DELAY DISCRETIZATION
Each unit of discretized delay represents the amount of
real delay. Due to rounding, each time discretization is performed,
a discretization error up to is introduced between
the discretized delay and the real delay. The maximum discretization
error of a path is determined by the number of times
that discretization is performed on the path. RTF, RTC, and RR
perform discretization at the page link level. Because discretization
is carried out on each link, the maximum error on the path is
linear to the path length. In order to achieve -approximation,
the accumulated error on a path cannot be too large. There are
two ways to reduce the error. One is to use a larger , which increases
the execution time of an algorithm whose complexity is
linear to . The other way is to reduce the number of discretizations
performed on the path.
Our second technique to control error is to perform discretization
on the path level, using the interval partitioning method for
combinatorial approximation [22]. For a path , ideally, discretization
is performed once as follows.
(11)
Because only one discretization is performed, the maximum discretization
error on any path is bounded by , independent of
the path length.
Below we design the path discretization algorithm (PDA)
based on the above intuition. The algorithm solves the -approximation
with the sameworst-case complexity asRDA. However,
its average execution time is better than RDA according to our
simulations. An auxiliary two-dimensional array, , keeps
track of the minimum delay of paths whose discretized delays
are from node to node .
PDA_Dijkstra is omitted because it is identical to RDA_Dijkstra
except that it calls Relax_PDA.
1. for each vertex , each do
2. , NIL,
3. ,
4.
5. if and then
6.
7.
8.
9.
10. do
11.
12.
13. while ,
where is the path with
The correctness of the algorithm is given in the theorem
below. The proof can be found in Appendix II.
Theorem 2: PDA solves the -approximation of DCLC in
time .
CHEN et al.: TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS 109
Fig. 1. Comparison of the average discretization errors of RTF, RTC, and RR with respect to different path lengths. The vertical axis is the average of j (P)j,
j (P)j, or j (P)j over 10 000 sample paths.
Fig. 2. Comparison of the average discretization errors of RTF, RTC, and RR with respect to different  values. The vertical axis is the average of j (P)j,
j (P)j, or j (P)j over 10 000 sample paths.
V. ANALYSIS
When RTF is used, all links have non-negative discretization
errors with a tight upper bound of . Hence, the discretization
errors on links of a path will add up to a non-negative value
with a tight upper bound of , which is linear to the
path length. Statistically, the longer the path, the larger the error.
For instance, if , , is uniformly distributed
in , the mean of is .
When RTC is used, all links have non-positive discretization
errors with a tight lower bound of . If ,
, is uniformly distributed in , the mean
of is .
The error of the proposed path-delay discretization is always
non-negative with a tight upper bound of , independent of
the path length.
To study RR, we model , , as a random
variable. For any path , is also a random variable. Assuming
the delays of different links are independent, we prove
the following theorem in Appendix III.
Theorem 3: Given a path , the mean of is zero and
the standard deviation of is at most , regardless
of the probability distributions of the page link delays.
We also perform simulations to compare the discretization errors
of different approaches. Fig. 1 shows how the discretization
errors of RTF, RTC and RR grow with the path length. The link
delay is randomly generated, following an exponential distribution
with a mean at 100 ms. The discretization errors of RTF and
RTC grow linearly with the path length,2 while the error of RR
grows sublinearly. Fig. 2 shows that, in order to achieve certain
discretization error goal, RR requires much smaller than RTF
and RTC, which means that algorithms based on RR are likely
to have less execution time.
VI. SIMULATION
A. Simulation Setup
The simulation uses two types of network topologies that are
generated based on the Power-Law model [23] and theWaxman
model [24]. In a Power-Law topology, the degrees of 10% nodes
are one, and the degrees of other nodes follow a power law distribution,
i.e., the frequency of a degree is proportional to the
degree raised to the power of a constant .
After each node is assigned a degree according to the power
law distribution, a spanning tree is formed among the nodes to
ensure a connected graph. Additional links are inserted to fulfill
the remaining degrees of every node with the neighbors selected
according to probabilities proportional to their respective
unfulfilled degrees. A Waxman topology is formed as follows:
2When the page link delay follows an exponential distribution, the average error
caused by RTF is smaller than that caused by RTC. However, when the link
delay follows a uniform distribution, the average error by RTF is the same as
that by RTC.
110 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008
the nodes are randomly placed in a one-by-one square, and the
probability of creating a page link between node and node is
where is the distance between and , , and
is the maximum distance between any two nodes. The average
node degree is 3.
The default simulation parameters are: The page link delays (costs)
are randomly generated, following the exponential distribution
with a mean of 100. . . Each data point is the
average over 1000 randomly generated routing requests. More
specifically, we randomly generate ten topologies. On each
topology, 100 routing requests are generated with the source
node randomly selected from the topology.We run DSA, RDA,
and PDA to find a cheapest feasible path to every destination
for which a feasible path exists. All simulations were done on
a PC with PIV 2 GHz CPU and 512 Megabytes memory.
The performance metrics used to evaluate the routing algorithms
are defined as follows.
All algorithms under simulation guarantee that the delay of
any returned path is bounded by .
B. Comparing RDA and PDA With DSA
We compare RDA and PDA with DSA [18], which is the
best known -approximation algorithm for DCLC. Fig. 3
shows the simulation results on Power-Law topologies with
500 nodes. Both RDA and PDA are much faster than DSA,
with PDA achieving the best execution time. The average costs
of the three algorithms are comparable. The success ratio of
RDA is slightly better than the other two. Because the three
algorithms are close in terms of average cost and success rate in
all simulations, we shall focus on execution time in the sequel.
Fig. 4 compares DSA, RDA, and PDAonWaxman topologies
with 1000 nodes. Both RDA and PDA again outperform DSA
significantly.
Fig. 5 compares the scalability of the three algorithms with
respect to the network size. The performance gap between
RDA/PDA and DSA increases for larger topologies. The
improvement exceeds an order of magnitude for 1000-node
networks.
Fig. 6 compares the algorithms with different values. The
performance gap between RDA/PDA and DSA increases when
is smaller, i.e., the -approximation is performed at the finer
level.
In summary, the simulation results confirmed our basic idea
that the execution time could be greatly improved by reducing
Fig. 3. Compare DSA, RDA, and PDA on Power-Law topologies. Both RDA
and PDA run much faster than DSA. They run slower than Dijkstra’s algorithm,
but achieve much smaller average path cost. The success rates of DSA, RDA,
and PDA are comparable, with RDA slightly better.
Fig. 4. Compare DSA, RDA, and PDA onWaxman topologies. Both RDA and
PDA run much faster than DSA. PDA is slightly better than RDA.
the discretization error, which was achieved very effectively by
RDA and PDA. With 1000 nodes and one constraint, RDA and
PDA computes the constrained shortest paths within 38 milliseconds
and 25 milliseconds, respectively, which makes them
practical solutions for routers to compute the QoS routing paths
periodically.
CHEN et al.: TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS 111
Fig. 5. Scalability comparison. The delay requirement is 1500. Both RDA and
PDA scale much better than DSA, with PDA the best.
Fig. 6. Compare DSA, RDA, and PDA with respect to different " values. The
delay requirement is 1500, and the network size is 500. Both RDA and PDA run
much faster than DSA. PDA is slightly better than RDA.
C. Comparing RDA and PDA With H_MCOP
We compare RDA and PDA with a fast heuristic algorithm
H_MCOP [14], whose time complexity is the same as that of
Dijkstra’s algorithm. H_MCOP does not solve the -approximation
of DCLC. Its goal is to use heuristics to greatly reduce
the computation time. To construct a feasible path with low cost
from a particular source node to a particular destination node,
H_MCOP requires building a shortest-path tree from all nodes
Fig. 7. Compare RDA and PDA with H_MCOP.
to the destination node and a tree from the source node to all
nodes. By the algorithm’s two-tree design, it is efficient in computing
a low-cost feasible path from one source to one destination,
but it is not suitable to find low-cost paths from one source
to all destinations. To solve this problem, H_MCOP would have
to repeat times, one for each destination and with a total time
complexity of . In comparison, RDA and
PDA solve the -approximation of DCLC, and they find constrained
shortest paths for all destinations with the same complexity
as finding a constrained shortest
path for a single destination.
The comparison of RDA/PDA and H_MCOP is made under
two scenarios. The first scenario is to use them as on-line
algorithms that process delay-constrained least-cost unicast
routing requests as they arrive. The results are shown in Fig. 7.
H_MCOP has also a parameter called lambda for a different
purpose, which is however insignificant when there is only
one constraint (for delay). H_MCOP significantly outperforms
RDA/PDA in average execution time, RDA/PDA are better in
terms of average cost and success rate because they relax the
delay requirement by a factor of . H_MCOP is a more
efficient on-line algorithm than RDA/PDA.
112 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008
TABLE I
EXECUTION TIME (MILLISECONDS) OF FINDING DELAY-CONSTRAINED
LEAST-COST PATHS FROM A SOURCE TO ALL DESTINATIONS ON
POWER-LAW TOPOLOGIES
In practice, on-line algorithms are not always desired. When
the request arrival rate is high (major gateways may receive
thousands or tens of thousands of requests every second), even
the time complexity of Dijkstra’s algorithm (executed on a perrequest
basis) will overwhelm the router. One typical approach
to solve this problem is to extend a link-state protocol (e.g.,
OSPF) and periodically pre-compute delay-constrained leastcost
paths for all destinations. In this way, the computation load
on a router is independent of the request arrival rate. Under such
scenario, RDA/PDA significantly outperforms H_MCOP by orders
of magnitude when the number of nodes is large, as shown
in Table I.
Therefore, H_MCOP is more suitable as an on-line algorithm,
while RDA/PDA are more suitable to calculate DCLC
paths from one source to all destinations so that a routing table
for certain QoS service class can be established. In addition,
RDA/PDA are the choice when a constrained multicast tree is
calculated centrally.
VII. CONCLUSION
In this paper, we proposed two techniques, randomized discretization
and path delay discretization, to design fast algorithms
for computing constrained shortest paths. While the previous
approaches (RTF and RTC) build up the discretization
error along a path, the newtechniques either make the page link errors
to cancel out each other along the path or treat the path delay as
a whole for discretization, which results in much smaller errors.
The algorithms based on these techniques run much faster than
the best existing algorithm that solves the -approximation of
DCLC.
APPENDIX
PROOF OF THEOREM 1
Refer to Section III for the lines of the pseudo code of RDA
(randomized discretization algorithm).
Lemma 1: It always holds that , ,
.
Proof: It holds initially. The value of changes only
at Line 12. Suppose and before
is called. Because
, Lines 6–7 make sure that . Hence,
after Line 12. The lemma remains true after the call.
Lemma 2: Let be the path stored by . It always
holds that , , .
Proof: Suppose it holds before is called.
. The new path under consideration is
.
After Lines 4–8, . After
Line 12, . Hence,
. The lemma holds after the call.
Lemma 3: Let be the path stored by . It always
holds that , , ,
where is the length (hops) of .
Proof: Suppose it holds before is called.
. The new path under consideration is
.
After Line 12, .
The lemma holds after the call.
Theorem 1: RDA solves the -approximation of DCLC in
time .
Proof: We first prove that if RDA terminates, it solves
the -approximation of DCLC. Consider an arbitrary node .
Let be the cheapest feasible path. Assume this is the only
path from to . Consider is called on a link
of . After Lines 4–5,
.
After Lines 6–8, because ,
. By Lemma 2, .We
have . Lines
9–12 will be executed. Eventually, will be stored by
for some .
Now if there exist other paths from to and one of them
replaces during the relaxation, the path must have a smaller
cost than . Hence, when RDA terminates, let be the path
returned by RDA for with . We must
have , and because otherwise
RDA will not terminate.
We now prove that RDA terminates in time
. When , by Lemma 3, ,
. By
Line 26, RDA terminates.
The time complexity of each execution of
is . Since
doubles each time, the time of the last execution is larger than
the combined time of all previous executions. Therefore, the
complexity of RDA is .
CHEN et al.: TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS 113
APPENDIX
PROOF OF THEOREM 2
Refer to Section IV for the lines of the pseudo code of RDA
(randomized discretization algorithm).
Lemma 4: Let be the path stored by . It always
holds that , .
The proof is trivial based on Line 8.
Lemma 5: Let be the path stored by . It always
holds that , , .
Proof: Suppose it holds before is called,
namely, and . The new path
under consideration is .
After Line 8 is executed, remains true.
Lemma 6: Let be the path stored by . It always
holds that ,
where is the length (hops) of .
Proof: Suppose it holds before is called.
. The new path under consideration
is .
After Lines 5–8, .
The lemma holds after the call.
Theorem 2: PDA solves the -approximation of DCLC in
time .
The proof is similar to that for Theorem 1 in Appendix I.
APPENDIX
PROOF OF THEOREM 3
Theorem 3: Given a path , the mean of is zero and
the standard deviation of is at most , regardless
of the probability distributions of the page link delays.
Proof: Consider an arbitrary page link on .
with prob.
with prob.
The mean (or expected value) of is
There are two cases.
• Case 1: If is an integer, i.e.,
, then it is clear that
.
• Case 2: If is not an integer, then
(12)
Denote as for clarity. Since the probability
density function of is , , the variance
of is
When , by (7), and
by (12). Hence,
114 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008
Because , reaches its maximum value of
1/4 when , we have
Therefore, given an arbitrary probability density function of
, we showed that and
, for every on . The mean and the variance of
are
The standard deviation of is
REFERENCES
[1] S. Chen and K. Nahrstedt, “An overview of quality-of-service routing
for the next generation high-speed networks: Problems and solutions,”
IEEE Network, Special Issue on Transmission and Distribution of Digital
Video, vol. 12, no. 6, pp. 64–79, Nov./Dec. 1998.
[2] R. Guerin and A. Orda, “QoS based routing in networks with inaccurate
information: theory and algorithms,” in Proc. IEEE INFOCOM, 1997,
pp. 75–83.
[3] T. Korkmaz and M. Krunz, “Source-oriented topology aggregation
with multiple QoS parameters in hierarchical ATMnetworks,” in Proc.
IEEE IWQoS’99, Jun. 1999, pp. 137–146.
[4] D. Raz and Y. Shavitt, “Optimal partition of QoS requirements with
discrete cost functions,” in Proc. IEEE INFOCOM, 2000, pp. 613–622.
[5] J. L. Sobrinho, “Algebra and algorithms for QoS path computation and
hop-by-hop routing in the Internet,” in Proc. IEEE INFOCOM, 2001,
pp. 727–735.
[6] Z.Wang and J. Crowcroft, “QoS routing for supporting resource reservation,”
IEEE J. Sel. Areas Commun., vol. 14, no. 7, pp. 1228–1234,
Sep. 1996.
[7] X.Yuan and X. Liu, “Heuristic algorithms for multi-constrained quality
of service routing,” in Proc. IEEE INFOCOM, 2001, pp. 844–853.
[8] A. Orda and A. Sprintson, “Efficient algorithms for computing disjoint
QoS paths,” in Proc. IEEE INFOCOM, 2004, pp. 727–738.
[9] Y. Xiao, K. Thulasiraman, and G. Xue, “Approximation and heuristic
algorithms for delay constrained path selection under inaccurate state
information,” in Proc. 1st Int. Conf. Quality of Service in Heterogeneous
Wired/Wireless Networks (QShine), Oct. 2004, pp. 130–137.
[10] Y. Xiao, K. Thulasiraman, and G. Xue, “Constrained shortest link-disjoint
paths selection: a network programming based approach,” IEEE
Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 5, pp. 1174–1187, May
2006.
[11] H. F. Salama, D. S. Reeves, and Y. Viniotis, “A distributed algorithm
for delay-constrained unicast routing,” in Proc. IEEE INFOCOM,
1997, pp. 84–91.
[12] G. Xue, “Primal-dual algorithms for computing weight-constrained
shortest paths and weight-constrained minimum spanning trees,” in
Proc. IEEE IPCCC’00, Feb. 2000, pp. 271–277.
[13] A. Juttner, B. Szviatovszki, I. Mecs, and Z. Rajko, “Lagrange relaxation
based method for the QoS routing problem,” in Proc. IEEE INFOCOM,
2001, pp. 859–868.
[14] T. Korkmaz and M. Krunz, “Multi-constrained optimal path selection,”
in Proc. IEEE INFOCOM, 2001, pp. 834–843.
[15] R. Hassin, “Approximation schemes for the restricted shortest path
problem,” Math. Oper. Res., vol. 17, pp. 36–42, 1992.
[16] D. Lorenz and D. Raz, “A simple efficient approximation scheme for
the restricted shortest path problem.” Bell Labs Tech. Memo., 1999.
[17] S. Chen and K. Nahrstedt, “On finding multi-constrained paths,” in
IEEE ICC’98, Jun. 1998, pp. 874–879.
[18] A. Goel, K. G. Ramakrishnan, D. Kataria, and D. Logothetis, “Efficient
computation of delay-sensitive routes for one source to all destinations,”
in Proc. IEEE INFOCOM, 2001, pp. 854–858.
[19] M. Garey and D. Johnson, Computers and Intractability: A Guide to
the Theory of NP-Completeness. New York: W. H. Freeman and Co.,
1979.
[20] H. C. Joksch, “The shortest route problem with constraints,” J. Math.
Anal. Applicat., vol. 14, pp. 191–197, 1966.
[21] D. Lorenz and D. Raz, “A simple efficient approximation scheme for
the restricted shortest paths problem,” Bell Labs Tech. Memo., 1999.
[22] S. Sahni, “General techniques for combinatorial approximation,” Oper.
Res., vol. 26, no. 5, 1977.
[23] M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On power-law relationships
of the Internet topology,” presented at the ACM SIGCOMM,
Boston, MA, 1999.
[24] B. M. Waxman, “Routing of multipoint connections,” IEEE J. Sel.
Areas Commun., vol. 6, no. 9, pp. 1617–1622, Dec. 1988.
[25] H. de Neve and P. van Mieghem, “A multiple quality of service
routing algorithm for PNNI,” in Proc. IEEE ATM Workshop, 1998, pp.
324–328.
Shigang Chen (M’02) received the B.S. degree in
computer science from the University of Science
and Technology of China (USTC), Hefei, China, in
1993. He received the M.S. and Ph.D. degrees in
computer science from the University of Illinois at
Urbana-Champaign in 1996 and 1999, respectively.
After graduation, he worked with Cisco Systems
for three years before joining University of Florida,
Gainesville, as an Assistant Professor in the Department
of Computer and Information Science and Engineering.
His research interests include network algorithms,
quality of service, and sensor networks.
Dr. Chen received the IEEE Communications Society Best Tutorial Paper
Award in 1999. He was a guest editor for ACM/Baltzer Journal of Wireless
Networks (WINET) and IEEE TRANSACTIONS ON VEHICLE TECHNOLOGIES. He
served as a TPC co-chair for the Computer and Network Security Symposium
of IEEE IWCCC 2006. He served as a vice TPC chair for IEEE MASS 2005,
a vice general chair for QShine 2005, a TPC co-chair for QShine 2004, and a
TPC member for many conferences including IEEE ICNP, IEEE INFOCOM,
IEEE SANS, IEEE ISSCC, and IEEE Globecom.
Meongchul Song (M’05) received the B.Eng. and
M.Eng. degrees in computer engineering from
Kyungpook National University, Korea, in 1991 and
1993, respectively, and the Ph.D. degree in computer
science from the University of Florida, Gainesville,
in 2005.
Prior to joining the University of Florida, he was a
software engineer with the Agency for Defense Development,
Korea, from 1993 to 1999. He is currently
a Senior Engineer in the Systems R&D Laboratories,
Samsung Electronics Co., Ltd., Gyeonggi-do, Korea.
His research interests include networks and approximation algorithms.
CHEN et al.: TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATHS 115
Sartaj Sahni (M’79–SM’86–F’88) received the
B.Tech. (electrical engineering) degree from the
Indian Institute of Technology, Kanpur, and the M.S.
and Ph.D. degrees in computer science from Cornell
University, Ithaca, NY.
He is a Distinguished Professor and Chair of Computer
and Information Sciences and Engineering at
the University of Florida. He has published over 300
research papers and written 15 texts. His research
publications are on the design and analysis of efficient
algorithms, parallel computing, interconnection
networks, design automation, and medical algorithms.
Dr. Sahni is a member of the European Academy of Sciences, a Fellow
of IEEE, ACM, AAAS, and the Minnesota Supercomputer Institute, and a
Distinguished Alumnus of the Indian Institute of Technology, Kanpur. In 1997,
he received the IEEE Computer Society Taylor L. Booth Education Award “for
contributions to computer science and engineering education in the areas of
data structures, algorithms, and parallel algorithms”, and in 2003, he received
the IEEE Computer Society W.Wallace McDowell Award “for contributions to
the theory of NP-hard and NP-complete problems”. He received the 2003 ACM
Karl Karlstrom Outstanding Educator Award for “outstanding contributions to
computing education through inspired teaching, development of courses and
curricula for distance education, contributions to professional societies, and
authoring significant textbooks in several areas including discrete mathematics,
data structures, algorithms, and parallel and distributed computing.” He is
a co-editor-in-chief of the Journal of Parallel and Distributed Computing,
a managing editor of the International Journal of Foundations of Computer
Science, and a member of the editorial boards of Computer Systems: Science
and Engineering, International Journal of High Performance Computing
and Networking, International Journal of Distributed Sensor Networks, and
Parallel Processing Letters. He has served as program committee chair and
general chair and has been a keynote speaker at many conferences. He has
served on several NSF and NIH panels and he has been involved as an external
evaluator of several Computer Science and Engineering Departments.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: elearning ufl blackboard, prisons florida, acm bitola, uml projects download, 1996 cadillac acm, what is pda, cheapest prostituttes in banglore,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  reverse gear in two wheeler project 1 3,005 17-03-2018, 07:40 AM
Last Post: Guest
  anti theft wheel locking in disc brake two wheelers using solenoid valve 2 1,534 01-08-2017, 10:28 PM
Last Post: anandh sachin
  theory of computation puntambekar book free download pdf 7 5,284 04-05-2017, 09:38 AM
Last Post: jaseela123d
  air suspension two wheeler 1 1,099 15-04-2017, 12:07 PM
Last Post: jaseela123d
  paper presentation topic modern construction materials and techniques 1 1,159 13-04-2017, 03:44 PM
Last Post: jaseela123d
  multi user mobile bluetooth two way text chat 1 974 13-04-2017, 02:49 PM
Last Post: jaseela123d
  sms based automatic two wheeler locking system ppt 1 987 12-04-2017, 12:47 PM
Last Post: jaseela123d
  bio engg techniques for erosion control in slope ppt 1 680 12-04-2017, 11:10 AM
Last Post: jaseela123d
  two factor authentication ppt 1 767 11-04-2017, 10:46 AM
Last Post: jaseela123d
  questionnaire of consumer preference towards two wheeler 1 1,646 10-04-2017, 04:27 PM
Last Post: jaseela123d

Forum Jump: