Fault Tolerant Spanners - u

Download Report

Transcript Fault Tolerant Spanners - u

Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension

Presented by: Shiri Chechik Joint with: Ittai Abraham, Cyril Gavoille, David Peleg

Distance Labeling s 8

Graph

2 2 2 4 3 3 3 2 3 t

Labels

… L s … L t

Distance Query 8

Distance Labeling Preprocessing Phase: preprocess

G

and assign to each vertex

v

of

G

label

L(v)

. Query Phase: given the labels

L(s)

a and

L(t)

, answer a query concerning the distance between

s

and

t

in

G

.

Distance Labeling   Computing exact distances may be costly in term of memory requirements. Typically, polynomial space is needed for exact distances in sparse graphs like planar graphs [Gavoille, Peleg, Pérennés, and Raz, 04] tolerated Thorup 04]) , whereas poly-logarithmic labels are possible if a small error is ([Peleg 99, Talwar 04, .

Approximate Distance Labeling s 8

Graph

2 2 2

Labels

4 … L s … L t 3 3 3 3 2 t

Approximate Distance Query ≈ d’ We require that d’ satisfy: d G (x,y) ≤ d’ ≤ (1+ε)d G (x,y)

Compact Routing s 8

Graph

2 2 2 4 3 3 3 2 3 t

Compact Routing   The situation is similar for compact routing:

Ω(n 1/2 )

-bit routing tables are required for shortest path routing in bounded growth networks ([Abraham et al. 2006]) or planar graphs. Routing tables of size

(ε -1 logn) O(1)

suffice for

(1+ ε)

-stretch routing scheme in bounded doubling dimension graphs ( [Abraham et al. 06, , Konjevod et al. 07, , Konjevod et al. 08, Slivkins 05, Slivkins 07] or in minor-free graphs ( [Abraham and Gavoille 06] ).

Forbidden-Set Approx. Distance Labeling s 8

Graph

2 2 2 4 3 3 2 t z 3 3

Labels

… L s … L z … L t …

Distance Query ≈ 11

Forbidden-Set Distance Labeling Preprocessing Phase: preprocess

G

and assign to each vertex

v

of

G

a label

L(v) {L(f) : f

. Query Phase: given the set of labels 

F}

, and the two labels

L(u)

and

L(v)

, answer a query concerning the distance between

u

and

v

in

G\F

.

Related Work

 In the failure-free setting, there is a vast literature on labeling schemes and information oracles, and it covers many aspects: distance, routing, exact queries, approximation, global or localized data structures.

Related Work

[Demetrescu and Thorup, 02]   General directed graphs. A scheme for answering

exact

queries.   

Single edge

failure. Oracle of size

O(n 2 logn)

Query time

O(log n)

distance

Related Work

   Exact case, cont: This has been extended to a

single edge and/or vertex failure

[Bernstein and Karger, 09] , and only recently to dual-

failure

[Duan and Pettie, 09] Approximated case: multiple edge failures [Chechik, Langberg, Peleg, and Roditty, 10] . The routing problem has been explored in [Khanna and Baswana, 10] for single vertex failure and in [Chechik, Langberg, Peleg, and Roditty, 10] for two edge failures.

Related Work

 A scheme for the forbidden-set distance labeling problem that allows the failure of arbitrary sub-graphs is given in [Courcelle and Twigg 07, Twigg 06] the clique-width of the graph.

. The label size depends on the tree-width or

Results - Forbidden-Set Distance Labeling      Unweighted graphs of doubling dimension

α

. Stretch of

(1+ ε)

. Label size

O(1+ ε -1 ) 2α log 2 n

. All the labels can be computed in polynomial time.

Each query can be answered in time polynomial in the length of the labels occurring in the query.

Results - Forbidden-Set Routing  The scheme extends to a forbidden set routing labeling scheme with: stretch

1+ε

and

O(1+ ε -1 ) 2α log 2 n

-bit routing tables.

Results – Lower Bound   The exponential term in

α

appearing in the label length bound in our schemes is in fact necessary.

We show that any forbidden-set connectivity labeling scheme on the family of unweighted graphs of doubling dimension

α

requires labels of length

Ω(2 α +logn)

.

Doubling Dimension

 The dimension of a metric space is the smallest

α

>

0

such that every ball of radius

2r

can be covered by

2 α

balls of radius

r

.

Doubling Dimension Fact

For a graph with doubling dimension

α

, there is an efficiently constructible

r

-dominating set

W(r)

, such that for every vertex

v

V(G)

the set

B(v,R,G)

W(r) (4R/r) α

.

and radius

R≥r

, has size at most

N 0 N 1 N 2 N 3

Hierarchy of Nets     Define a hierarchy of nets, namely, vertex sets in

G

, denoted by

N i

, one for each level

0≤i≤logn

, with the following properties:

N 0 =V(G) N i

N i N

is a

i-1

, for all

i>0

.

2 i

-dominating set for

G

.

N 0 N 1 N 2 N 3

Hierarchy of Nets  For every vertex

v

, let

M i (v) N i

closest to be the net-point in

v

. Note that

d G (v,M i (v)) ≤ 2 i

.

M 2 (v)

v

M 1 (v) M 3 (v)

N 0 N 1 N 2 N 3

Failure-free case : Preprocessing  The label

L(v)

of each vertex

v

distances from

v B(v,2 i+2 ,G)

 to all vertices in

N i-c M j (v)

for every

0≤j≤logn

.

consists of the for every

c≤i≤logn

and v

N 0 N 1 N 2 N 3

Failure-free case: Query phase   Find the smallest index

i B(s,2 i+2 ,G)

such that

M i-c (t)

We then return

d'=d G (s,M i-c (t)) + d G (t, M i-c (t))

.

is in w s t

Failure-free case  Setting

c=max{

log(2/ε)

,0}

desired stretch of

1+ε

yields the

N 0 N 1 N 2 N 3

Forbidden-Set Distance Labeling s w x t

N 0 N 1 N 2 N 3

Forbidden-Set Distance Labeling s w x t

N 0 N 1 N 2 N 3

Forbidden-Set Distance Labeling w s x t

N 0 N 1 N 2 N 3

Forbidden-Set Distance Labeling s w x t

N 0 N 1 N 2 N 3

Forbidden-Set Distance Labeling s x 2 w x 1 t

Forbidden-Set Distance Labeling  Unweighted graphs of doubling dimension

α

have a forbidden-set

(1+ ε)

-approximate distance labeling scheme of label

O(1+ ε -1 ) 2α log 2 n

. All the labels can be computed in polynomial time, and each query can be answered in time polynomial in the length of the labels occurring in the query.

Results   The scheme extends to a forbidden-set routing labeling scheme with stretch

1+ε

and

O(1+ ε -1 ) 2α log 2 n

-bit routing tables.

The exponential term in

α

appearing in the label length bound in our schemes is in fact necessary, even for a connectivity labeling scheme. We show that any forbidden-set connectivity labeling scheme on the family of unweighted graphs of doubling dimension

α

requires labels of length

Ω(2 α +logn)

.

Thank You!