Approximation Algorithms for Hop Constrained and Buy-At-Bulk Network Design via Hop Constrained Oblivious Routing

Authors Chandra Chekuri, Rhea Jain



PDF
Thumbnail PDF

File

LIPIcs.ESA.2024.41.pdf
  • Filesize: 0.75 MB
  • 21 pages

Document Identifiers

Author Details

Chandra Chekuri
  • University of Illinois, Urbana-Champaign, IL, USA
Rhea Jain
  • University of Illinois, Urbana-Champaign, IL, USA

Acknowledgements

We thank Mik Zlatin for helpful discussions on hop-constrained metric embeddings.

Cite AsGet BibTex

Chandra Chekuri and Rhea Jain. Approximation Algorithms for Hop Constrained and Buy-At-Bulk Network Design via Hop Constrained Oblivious Routing. In 32nd Annual European Symposium on Algorithms (ESA 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 308, pp. 41:1-41:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.ESA.2024.41

Abstract

We consider two-cost network design models in which edges of the input graph have an associated cost and length. We build upon recent advances in hop-constrained oblivious routing to obtain two sets of results. We address multicommodity buy-at-bulk network design in the nonuniform setting. Existing poly-logarithmic approximations are based on the junction tree approach [Chekuri et al., 2010; Guy Kortsarz and Zeev Nutov, 2011]. We obtain a new polylogarithmic approximation via a natural LP relaxation. This establishes an upper bound on its integrality gap and affirmatively answers an open question raised in [Chekuri et al., 2010]. The rounding is based on recent results in hop-constrained oblivious routing [Ghaffari et al., 2021], and this technique yields a polylogarithmic approximation in more general settings such as set connectivity. Our algorithm for buy-at-bulk network design is based on an LP-based reduction to h-hop constrained network design for which we obtain LP-based bicriteria approximation algorithms. We also consider a fault-tolerant version of h-hop constrained network design where one wants to design a low-cost network to guarantee short paths between a given set of source-sink pairs even when k-1 edges can fail. This model has been considered in network design [Luis Gouveia and Markus Leitner, 2017; Gouveia et al., 2018; Arslan et al., 2020] but no approximation algorithms were known. We obtain polylogarithmic bicriteria approximation algorithms for the single-source setting for any fixed k. We build upon the single-source algorithm and the junction-tree approach to obtain an approximation algorithm for the multicommodity setting when at most one edge can fail.

Subject Classification

ACM Subject Classification
  • Theory of computation → Discrete optimization
  • Theory of computation → Routing and network design problems
Keywords
  • Buy-at-bulk
  • Hop-constrained network design
  • LP integrality gap
  • Fault-tolerant network design

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Ali Ahmadi, Iman Gholami, MohammadTaghi Hajiaghayi, Peyman Jabbarzade, and Mohammad Mahdavi. 2-Approximation for Prize-Collecting Steiner Forest, pages 669-693. SIAM, 2024. URL: https://doi.org/10.1137/1.9781611977912.25.
  2. Noga Alon, Baruch Awerbuch, Yossi Azar, Niv Buchbinder, and Joseph Naor. A general approach to online network optimization problems. ACM Transactions on Algorithms (TALG), 2(4):640-660, 2006. Google Scholar
  3. Ernst Althaus, Stefan Funke, Sariel Har-Peled, Jochen Könemann, Edgar A. Ramos, and Martin Skutella. Approximating k-hop minimum-spanning trees. Operations Research Letters, 33(2):115-120, 2005. URL: https://doi.org/10.1016/j.orl.2004.05.005.
  4. M. Andrews. Hardness of buy-at-bulk network design. In 45th Annual IEEE Symposium on Foundations of Computer Science, pages 115-124, 2004. URL: https://doi.org/10.1109/FOCS.2004.32.
  5. Matthew Andrews and Lisa Zhang. The access network design problem. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science, FOCS '98, page 40, USA, 1998. IEEE Computer Society. Google Scholar
  6. Spyridon Antonakopoulos, Chandra Chekuri, Bruce Shepherd, and Lisa Zhang. Buy-at-bulk network design with protection. Mathematics of Operations Research, 36(1):71-87, 2011. URL: https://doi.org/10.1287/moor.1110.0484.
  7. Okan Arslan, Ola Jabali, and Gilbert Laporte. A flexible, natural formulation for the network design problem with vulnerability constraints. INFORMS Journal on Computing, 32(1):120-134, 2020. URL: https://doi.org/10.1287/ijoc.2018.0869.
  8. G. R. Ash, R. H. Cardwell, and R. P. Murray. Design and optimization of networks with dynamic routing. The Bell System Technical Journal, 60(8):1787-1820, 1981. URL: https://doi.org/10.1002/j.1538-7305.1981.tb00297.x.
  9. B. Awerbuch and Y. Azar. Buy-at-bulk network design. In Proceedings 38th Annual Symposium on Foundations of Computer Science, pages 542-547, 1997. URL: https://doi.org/10.1109/SFCS.1997.646143.
  10. Anantaram Balakrishnan and Kemal Altinkemer. Using a hop-constrained model to generate alternative communication network design. ORSA Journal on Computing, 4(2):192-205, 1992. URL: https://doi.org/10.1287/ijoc.4.2.192.
  11. Anantaram Balakrishnan and Christian Vad Karsten. Container shipping service selection and cargo routing with transshipment limits. European Journal of Operational Research, 263(2):652-663, 2017. URL: https://doi.org/10.1016/j.ejor.2017.05.03.
  12. Judit Bar-Ilan, Guy Kortsarz, and David Peleg. Generalized submodular cover problems and applications. Theoretical Computer Science, 250(1):179-200, 2001. URL: https://doi.org/10.1016/S0304-3975(99)00130-9.
  13. Yair Bartal. On approximating arbitrary metrices by tree metrics. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC '98, pages 161-168, New York, NY, USA, 1998. Association for Computing Machinery. URL: https://doi.org/10.1145/276698.276725.
  14. Daniel Bienstock, Michel X Goemans, David Simchi-Levi, and David Williamson. A note on the prize collecting traveling salesman problem. Mathematical programming, 59(1-3):413-420, 1993. Google Scholar
  15. Daniel Bienstock and Oktay Günlük. Capacitated network design—polyhedral structure and computation. INFORMS Journal on Computing, 8(3):243-259, 1996. URL: https://doi.org/10.1287/ijoc.8.3.243.
  16. Quentin Botton, Bernard Fortz, Luis Gouveia, and Michael Poss. Benders decomposition for the hop-constrained survivable network design problem. INFORMS Journal on Computing, 25(1):13-26, 2013. URL: https://doi.org/10.1287/ijoc.1110.0472.
  17. Jarosław Byrka, Fabrizio Grandoni, Thomas Rothvoß, and Laura Sanità. Steiner tree approximation via iterative randomized rounding. Journal of the ACM (JACM), 60(1):1-33, 2013. Google Scholar
  18. Parinya Chalermsook, Fabrizio Grandoni, and Bundit Laekhanukit. On Survivable Set Connectivity, pages 25-36. SIAM, 2015. URL: https://doi.org/10.1137/1.9781611973730.3.
  19. Moses Charikar and Adriana Karagiozova. On non-uniform multicommodity buy-at-bulk network design. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, STOC '05, pages 176-182, New York, NY, USA, 2005. Association for Computing Machinery. URL: https://doi.org/10.1145/1060590.1060617.
  20. C. Chekuri, M. T. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour. Approximation algorithms for nonuniform buy-at-bulk network design. SIAM Journal on Computing, 39(5):1772-1798, 2010. URL: https://doi.org/10.1137/090750317.
  21. Chandra Chekuri, Guy Even, Anupam Gupta, and Danny Segev. Set connectivity problems in undirected graphs and the directed steiner network problem. ACM Trans. Algorithms, 7(2), March 2011. URL: https://doi.org/10.1145/1921659.1921664.
  22. Chandra Chekuri and Rhea Jain. Approximation Algorithms for Network Design in Non-Uniform Fault Models. In Kousha Etessami, Uriel Feige, and Gabriele Puppis, editors, 50th International Colloquium on Automata, Languages, and Programming (ICALP 2023), volume 261 of Leibniz International Proceedings in Informatics (LIPIcs), pages 36:1-36:20, Dagstuhl, Germany, 2023. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. URL: https://doi.org/10.4230/LIPIcs.ICALP.2023.36.
  23. Chandra Chekuri and Rhea Jain. Approximation algorithms for hop constrained and buy-at-bulk network design via hop constrained oblivious routing, 2024. URL: https://arxiv.org/abs/2404.16725.
  24. Chandra Chekuri, Sanjeev Khanna, and Joseph (Seffi) Naor. A deterministic algorithm for the cost-distance problem. In Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '01, pages 232-233, USA, 2001. Society for Industrial and Applied Mathematics. Google Scholar
  25. Chandra Chekuri and Nitish Korula. Single-sink network design with vertex connectivity requirements. In Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, volume 2 of Leibniz International Proceedings in Informatics (LIPIcs), pages 131-142, Dagstuhl, Germany, 2008. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. URL: https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1747.
  26. Chandra Chekuri and Martin Pal. A recursive greedy algorithm for walks in directed graphs. In 46th annual IEEE symposium on foundations of computer science (FOCS'05), pages 245-253. IEEE, 2005. Google Scholar
  27. Q. Chen, B. Laekhanukit, C. Liao, and Y. Zhang. Survivable network design revisited: Group-connectivity. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 278-289, Los Alamitos, CA, USA, November 2022. IEEE Computer Society. URL: https://doi.org/10.1109/FOCS54457.2022.00033.
  28. F. R. K. Chung and M. R. Garey. Diameter bounds for altered graphs. Journal of Graph Theory, 8(4):511-534, 1984. URL: https://doi.org/10.1002/jgt.3190080408.
  29. Julia Chuzhoy, Anupam Gupta, Joseph (Seffi) Naor, and Amitabh Sinha. On the approximability of some network design problems. ACM Trans. Algorithms, 4(2), May 2008. URL: https://doi.org/10.1145/1361192.1361200.
  30. Geir Dahl. The 2-hop spanning tree problem. Operations Research Letters, 23(1):21-26, 1998. URL: https://doi.org/10.1016/S0167-6377(98)00029-7.
  31. Jérôme De Boeck and Bernard Fortz. Extended formulation for hop constrained distribution network configuration problems. European Journal of Operational Research, 265(2):488-502, 2018. URL: https://doi.org/10.1016/j.ejor.2017.08.01.
  32. I. Diarrassouba, V. Gabrel, A. R. Mahjoub, L. Gouveia, and P. Pesneau. Integer programming formulations for the k-edge-connected 3-hop-constrained network design problem. Networks, 67(2):148-169, 2016. URL: https://doi.org/10.1002/net.21667.
  33. I. Diarrassouba, A. R. Mahjoub, and I. M. Almudahka. Optimization algorithms for the k edge-connected l-hop-constrained network design problem. Soft Computing, February 2024. URL: https://doi.org/10.1007/s00500-023-09541-7.
  34. Michael Dinitz, Guy Kortsarz, and Ran Raz. Label cover instances with large girth and the hardness of approximating basic k-spanner. ACM Trans. Algorithms, 12(2), December 2016. URL: https://doi.org/10.1145/2818375.
  35. Jittat Fakcharoenphol, Satish Rao, and Kunal Talwar. A tight bound on approximating arbitrary metrics by tree metrics. Journal of Computer and System Sciences, 69(3):485-497, 2004. Special Issue on STOC 2003. URL: https://doi.org/10.1016/j.jcss.2004.04.011.
  36. A. Filtser. Hop-constrained metric embeddings and their applications. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 492-503, Los Alamitos, CA, USA, February 2022. IEEE Computer Society. URL: https://doi.org/10.1109/FOCS52979.2021.00056.
  37. Naveen Garg, Goran Konjevod, and Ramamoorthi Ravi. A polylogarithmic approximation algorithm for the group steiner tree problem. Journal of Algorithms, 37(1):66-84, 2000. Preliminary version in Proc. of ACM-SIAM SODA 1998. Google Scholar
  38. Mohsen Ghaffari, Bernhard Haeupler, and Goran Zuzic. Hop-constrained oblivious routing. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2021, pages 1208-1220, New York, NY, USA, 2021. Association for Computing Machinery. URL: https://doi.org/10.1145/3406325.3451098.
  39. Rohan Ghuge and Viswanath Nagarajan. Quasi-polynomial algorithms for submodular tree orienteering and directed network design problems. Mathematics of Operations Research, 47(2):1612-1630, 2022. Google Scholar
  40. L. Gouveia, P. Patricio, A.F. de Sousa, and R. Valadas. Mpls over wdm network design with packet level qos constraints based on ilp models. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), volume 1, pages 576-586 vol.1, 2003. URL: https://doi.org/10.1109/INFCOM.2003.1208708.
  41. Luis Gouveia, Martim Joyce-Moniz, and Markus Leitner. Branch-and-cut methods for the network design problem with vulnerability constraints. Computers & Operations Research, 91:190-208, 2018. Google Scholar
  42. Luis Gouveia and Markus Leitner. Design of survivable networks with vulnerability constraints. European Journal of Operational Research, 258(1):89-103, 2017. URL: https://doi.org/10.1016/j.ejor.2016.09.003.
  43. Fabrizio Grandoni and Giuseppe F. Italiano. Improved approximation for single-sink buy-at-bulk. In Tetsuo Asano, editor, Algorithms and Computation, pages 111-120, Berlin, Heidelberg, 2006. Springer Berlin Heidelberg. Google Scholar
  44. Fabrizio Grandoni, Bundit Laekhanukit, and Shi Li. O (log2 k/log log k)-approximation algorithm for directed steiner tree: a tight quasi-polynomial-time algorithm. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pages 253-264, 2019. Google Scholar
  45. Sudipto Guha, Adam Meyerson, and Kamesh Munagala. A constant factor approximation for the single sink edge installation problems. In Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, STOC '01, pages 383-388, New York, NY, USA, 2001. Association for Computing Machinery. URL: https://doi.org/10.1145/380752.380827.
  46. Anupam Gupta, Ravishankar Krishnaswamy, and R. Ravi. Tree embeddings for two-edge-connected network design. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '10, pages 1521-1538, USA, 2010. Society for Industrial and Applied Mathematics. Google Scholar
  47. Anupam Gupta, Amit Kumar, and Tim Roughgarden. Simpler and better approximation algorithms for network design. In Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, STOC '03, pages 365-372, New York, NY, USA, 2003. Association for Computing Machinery. URL: https://doi.org/10.1145/780542.780597.
  48. Anupam Gupta, Viswanath Nagarajan, and R Ravi. An improved approximation algorithm for requirement cut. Operations Research Letters, 38(4):322-325, 2010. Google Scholar
  49. Bernhard Haeupler, D. Ellis Hershkowitz, and Goran Zuzic. Tree embeddings for hop-constrained network design. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2021, pages 356-369, New York, NY, USA, 2021. Association for Computing Machinery. URL: https://doi.org/10.1145/3406325.3451053.
  50. Mohammad Taghi Hajiaghayi, Guy Kortsarz, and Mohammad R Salavatipour. Approximating buy-at-bulk and shallow-light k-steiner trees. Algorithmica, 53:89-103, 2009. Google Scholar
  51. Eran Halperin, Guy Kortsarz, Robert Krauthgamer, Aravind Srinivasan, and Nan Wang. Integrality ratio for group steiner trees and directed steiner trees. SIAM Journal on Computing, 36(5):1494-1511, 2007. Google Scholar
  52. Eran Halperin and Robert Krauthgamer. Polylogarithmic inapproximability. In Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pages 585-594, 2003. Google Scholar
  53. David Huygens, Ali Ridha Mahjoub, and Pierre Pesneau. Two edge-disjoint hop-constrained paths and polyhedra. SIAM Journal on Discrete Mathematics, 18(2):287-312, 2004. URL: https://doi.org/10.1137/S0895480102419445.
  54. K. Jain. A factor 2 approximation algorithm for the generalized Steiner network problem. Combinatorica, 21(1):39-60, 2001. Google Scholar
  55. Erez Kantor and David Peleg. Approximate hierarchical facility location and applications to the shallow steiner tree and range assignment problems. In Tiziana Calamoneri, Irene Finocchi, and Giuseppe F. Italiano, editors, Algorithms and Complexity, pages 211-222, Berlin, Heidelberg, 2006. Springer Berlin Heidelberg. Google Scholar
  56. M. Reza Khani and Mohammad R. Salavatipour. Improved approximations for buy-at-bulk and shallow-light k-steiner trees and (k,2)-subgraph. J. Comb. Optim., 31(2):669-685, February 2016. URL: https://doi.org/10.1007/s10878-014-9774-5.
  57. Jochen Könemann, Asaf Levin, and Amitabh Sinha. Approximating the degree-bounded minimum diameter spanning tree problem. Algorithmica, 41:117-129, 2005. Google Scholar
  58. Guy Kortsarz and Zeev Nutov. Approximating some network design problems with node costs. Theoretical Computer Science, 412(35):4482-4492, 2011. URL: https://doi.org/10.1016/j.tcs.2011.04.013.
  59. Guy Kortsarz and David Peleg. Approximating shallow-light trees. In Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '97, pages 103-110, USA, 1997. Society for Industrial and Applied Mathematics. Google Scholar
  60. Larry J. LeBlanc, Jerome Chifflet, and Philippe Mahey. Packet routing in telecommunication networks with path and flow restrictions. INFORMS Journal on Computing, 11(2):188-197, 1999. URL: https://doi.org/10.1287/ijoc.11.2.188.
  61. Serge Lhomme. Vulnerability and resilience of ports and maritime networks to cascading failures and targeted attacks. In Routledge, editor, Maritime Networks. Spatial Structures and Time Dynamic. Routledge, October 2015. URL: https://hal.science/hal-01275157.
  62. A. Ridha Mahjoub, Michael Poss, Luidi Simonetti, and Eduardo Uchoa. Distance transformation for network design problems. SIAM Journal on Optimization, 29(2):1687-1713, 2019. URL: https://doi.org/10.1137/16M1108261.
  63. A. Ridha Mahjoub, Luidi Simonetti, and Eduardo Uchoa. Hop-level flow formulation for the survivable network design with hop constraints problem. Networks, 61(2):171-179, 2013. URL: https://doi.org/10.1002/net.21483.
  64. Madhav V Marathe, R Ravi, Ravi Sundaram, S.S Ravi, Daniel J Rosenkrantz, and Harry B Hunt. Bicriteria network design problems. Journal of Algorithms, 28(1):142-171, 1998. URL: https://doi.org/10.1006/jagm.1998.0930.
  65. Adam Meyerson, Kamesh Munagala, and Serge Plotkin. Cost-distance: Two metric network design. SIAM Journal on Computing, 38(4):1648-1659, 2008. URL: https://doi.org/10.1137/050629665.
  66. C. Monma and Diane Sheng. Backbone network design and performance analysis: A methodology for packet switching networks. IEEE Journal on Selected Areas in Communications, 4(6):946-965, 1986. URL: https://doi.org/10.1109/JSAC.1986.1146400.
  67. Hasan Pirkul and Samit Soni. New formulations and solution procedures for the hop constrained network design problem. European Journal of Operational Research, 148(1):126-140, 2003. URL: https://doi.org/10.1016/S0377-2217(02)00366-1.
  68. Harald Räcke. Optimal hierarchical decompositions for congestion minimization in networks. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, STOC '08, pages 255-264, New York, NY, USA, 2008. Association for Computing Machinery. URL: https://doi.org/10.1145/1374376.1374415.
  69. R. Ravi. Rapid rumor ramification: approximating the minimum broadcast time. In Proceedings 35th Annual Symposium on Foundations of Computer Science, pages 202-213, 1994. URL: https://doi.org/10.1109/SFCS.1994.365693.
  70. Gabriele Reich and Peter Widmayer. Beyond steiner’s problem: A vlsi oriented generalization. In International Workshop on Graph-theoretic Concepts in Computer Science, pages 196-210. Springer, 1989. Google Scholar
  71. André Rossi, Alexis Aubry, and Mireille Jacomino. Connectivity-and-hop-constrained design of electricity distribution networks. European Journal of Operational Research, 218(1):48-57, 2012. URL: https://doi.org/10.1016/j.ejor.2011.10.006.
  72. B. Rothfarb and M. Goldstein. The one-terminal telpak problem. Operations Research, 19(1):156-169, 1971. URL: https://doi.org/10.1287/opre.19.1.156.
  73. F Sibel Salman, Joseph Cheriyan, R Ravi, and Sairam Subramanian. Buy-at-bulk network design: Approximating the single-sink edge installation problem. In Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms, pages 619-628, 1997. Google Scholar
  74. Kunal Talwar. The single-sink buy-at-bulk lp has constant integrality gap. In William J. Cook and Andreas S. Schulz, editors, Integer Programming and Combinatorial Optimization, pages 475-486, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg. Google Scholar
  75. Kathleen A. Woolston and Susan L. Albin. The design of centralized networks with reliability and availability constraints. Computers and Operations Research, 15(3):207-217, 1988. URL: https://doi.org/10.1016/0305-0548(88)90033-0.
  76. İbrahim Akgün and Barbaros Ç. Tansel. New formulations of the hop-constrained minimum spanning tree problem via miller-tucker-zemlin constraints. European Journal of Operational Research, 212(2):263-276, 2011. URL: https://doi.org/10.1016/j.ejor.2011.01.051.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail