Abstract 1 Introduction 2 Preliminaries 3 Hardness and lower bounds 4 Approximation with Steiner nodes 5 Applications 6 Empirical Evaluation 7 Conclusion References Appendix A Hardness of bounded-degree network design Appendix B Additional tables and figures

Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding

Aleksander Figiel ORCID TU Berlin, Germany Janne H. Korhonen TU Berlin, Germany Neil Olver ORCID London School of Economics and Political Science, UK Stefan Schmid ORCID TU Berlin, Germany
Fraunhofer SIT, Berlin, Germany
Abstract

Emerging optical switching technologies enable demand-aware datacenter networks, whose topology can be flexibly optimized toward the traffic they serve. This paper revisits the bounded-degree network design problem underlying such demand-aware networks. Namely, given a distribution over communicating node pairs (represented has a demand graph), we want to design a network with bounded maximum degree (called host graph) that minimizes the expected communication distance.

We improve the understanding of this problem domain by filling several gaps in prior work. First, we present the first practical algorithm for solving this problem on arbitrary instances without violating the degree bound. Our algorithm is based on novel insights obtained from studying a new Steiner node version of the problem, and we report on an extensive empirical evaluation, using several real-world traffic traces from datacenters, finding that our approach results in improved demand-aware network designs. Second, we shed light on the complexity and hardness of the bounded-degree network design problem by formally establishing its NP-completeness for any degree. We use our techniques to improve prior upper bounds for sparse instances.

Finally, we study an intriguing connection between demand-aware network design and the virtual networking embedding problem, and show that the latter cannot be used to approximate the former: there is no universal host graph which can provide a constant approximation for our problem.

Keywords and phrases:
demand-aware networks, algorithms, virtual network embedding
Copyright and License:
[Uncaptioned image] © Aleksander Figiel, Janne H. Korhonen, Neil Olver, and Stefan Schmid; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Routing and network design problems
; Networks Data center networks
Related Version:
Demand-Aware Network Design with Steiner Nodes and a Connection to Virtual Network Embedding
Funding:
This work is supported by the European Research Council (ERC) under grant agreement No. 864228 (AdjustNet), 2020-2025.
Editors:
Silvia Bonomi, Letterio Galletta, Etienne Rivière, and Valerio Schiavoni

1 Introduction

With the popularity of data-centric applications and artificial intelligence, the traffic in datacenters is growing explosively. Accordingly, over the last years, significant research efforts have been made to render datacenter networks and other distributed computing infrastructure more efficient and flexible [28].

An intriguing approach to improve performance in networked and distributed systems, is to make them more demand-aware. In particular, emerging optical communication technologies allow to dynamically change the topology interconnecting the datacenter racks, according to the workload they currently serve [36, 22]. But also virtualization technologies enable demand-awareness, e.g., by allowing to flexibly embed a workload (e.g., processes or virtual machines) on a given infrastructure [26].

Such demand-awareness is attractive as empirical studies (e.g., from Google [36], Microsoft [12], Facebook [17]) show that communication traffic features significant spatial locality, which can be exploited for optimization [4]. For example, in a demand-aware network, frequently communicating nodes (e.g., a pair of racks in a datacenter) can be placed topologically closer, reducing communication costs and hence improving the overall performance. However, the underlying algorithmic problem of such demand-aware networks is still not well understood today.

This paper revisits the design of efficient demand-aware networks, and in particular the bounded-degree network topology design problem [8]: given a traffic matrix describing the communication demand between pairs of nodes, find a network topology (i.e., a graph) which “serves this traffic well.” Informally, the network interconnecting the nodes should be demand-aware in the sense that it provides short paths between frequently communicating node pairs, minimizing the number of hops travelled per bit. The degree bound is motivated by practical constraints and scalability requirements: reconfigurable switches typically have a limited number of ports. For example, reconfigurable links based on moving lasers or mirrors require space, and each optical circuit switch provides a single matching (i.e., degree 1 per node), hence typically limiting the degree to a small constant (e.g., 16) [24].

Bounded network design.

To formalise the goal of demand-aware network design, we adopt the framework introduced by Avin et al. [7, 8]. Specifically, in the bounded-degree demand-aware network design problem (or bounded network design problem for short), we are given a degree bound Δ, a node set V={1,2,,n} and a probability distribution p:(V2)[0,1] over possible edges111We note that compared to the original formulation of the problem given by Avin et al. [7, 8], we define the demand distribution over undirected edges instead of directed edges. However, one may easily observe that the two formulations are equivalent: adding the demands on two opposite directed edges to a single undirected edge or splitting the demand of an undirected edge into equal demands on the two corresponding directed edges results in the same objective function. over set V. The task is to find a graph G=(V,E) with maximum degree Δ minimizing the expected path length

{u,v}(V2)p({u,v})dG(u,v), (1)

where dG(u,v) denotes the (hop) distance between u and v in G. We interpret the edges e(V2) with non-zero probability p(e) as forming a graph D=(V,ED) that we will refer to as a demand graph. We call the edges of the demand graph demand edges. The graph obtained as a solution is called the host graph.

State of the art and challenges.

Avin et al. [7, 8], in addition to introducing the bounded-degree network design problem, give approximation algorithms for sparse and other restricted demand distributions. This line of work is continued by Peres and Avin [34], who use square roots of graphs to obtain improved approximation algorithms for sparse distributions. The problem is also related to demand-aware data structures, such as biased binary search trees [38]. There already exists much follow-up work, e.g., on designs accounting for robustness [6], congestion [9], or scenarios where the demand-aware network is built upon a demand-oblivious network [10, 19], among many others [24, 35].

However, in terms of solving bounded-degree network design problem for general demand distributions, existing solutions face a major challenge, namely that the maximum degree of their produced host graphs depends on the density of the demand graph. More specifically, the approximation algorithms of [7, 8, 34] are what we will henceforth call demand balancing algorithms: if the demand graph has average degree Δavg, then the output host graph will have maximum degree 𝒪(Δavg). Considering that the degree bound Δ represents the physical limitations of the network hardware, solutions of the demand balancing algorithms are not feasible for ΔavgΔ.

Further, we note that the computational complexity of the bounded-degree network design problem is not fully understood. Avin et al. [7, 8] note that for Δ=2 and connected demand graphs, the problem is equivalent to minimum circular arrangement problem and thus NP-hard. However, for general Δ without additional assumptions, the existing literature does not give an NP-completeness proof.

Other related work.

Demand-aware networks are motivated by their applications in datacenters, where reconfigurable optical communication technologies recently introduced unprecedented flexibilities [22, 23, 41, 16, 39, 42, 25, 11, 2]. Demand-aware networks have also been studied in the context of virtualized infrastructures, and especially the virtual network embedding problem has been subject to intensive research over the last decade [18, 37, 14, 26].

However, there is also much research on demand-oblivious reconfigurable datacenter networks [32, 12, 31, 40, 3, 1]. For a review of the enabling technologies of dynamic datacenter, networks, we refer the reader to the recent survey by Hall et al. [24].

Our contributions.

We make the following contributions. We present the first polynomial-time heuristic algorithm for computing bounded-degree network designs for general demand distributions, which guarantee that the degree bound Δ is not violated (henceforth referred to as fixed-degree heuristic). This algorithm is based on solving a high-weight subproblem using an approximation algorithm for a variant of the original problem, as we will discuss below, and provably provides a valid solution for the bounded network design problem on all instances. We report on an extensive empirical evaluation, using several real-world traffic traces from datacenters. We compare our algorithm to simple solutions based on random trees and graphs as well as several simple greedy heuristics, and show that it is more reliable and produces solutions with smaller effective path lengths.

We introduce and study a variant of the bounded network design problem, in a resource augmentation model where we are allowed to use Steiner nodes in addition to the nodes of the demand graph. This approach is motivated by existing bicriteria algorithms in the literature on demand-aware network designs (which however allow for degree augmentation), and it turns out to be useful to overcome some of the limitations of existing approaches to the original bounded network design problem.

Formally, in the bounded network design problem with Steiner nodes, we are given a degree bound Δ, a node set V={1,2,,n} and a probability distribution p:(V2)[0,1] over possible edges over set V as before. The task is to find a graph G=(VU,E) with maximum degree Δ, where U is an arbitrary set disjoint from V, minimizing the expected path length (1). We refer to nodes in U as Steiner nodes.

We show that this variant of bounded network design can be approximated within factor 2+o(1) in polynomial time, using elegant techniques from coding theory. The approximation algorithm will further be useful in designing various other algorithms for the standard version of bounded network design.

Interestingly, we can use our approximation algorithm for bounded network design with Steiner nodes to obtain an improved demand balancing algorithm for bounded network design without Steiner nodes: given an demand distribution with average degree Δavg, our algorithm computes a host graph with maximum degree at most 4Δavg+1 and a expected path length within constant factor of the expected path length of the optimal degree-(4Δavg+1) host graph. This provides better guarantees in both parameters than the existing algorithms of Avin et al. [7, 8] and Peres and Avin [34], which we also demonstrate via experimental evaluation.

A second main objective in this work is to settle the computational complexity of the bounded-degree network design problem. We show that the problem is indeed NP-complete for any fixed degree bound Δ2, and this also holds for the variant with Steiner nodes.

We further explore an intriguing connection between the problem of designing demand-aware network topologies and the virtual network embedding problem, where the demand graph can be placed on a given (demand-oblivious) network in a demand-aware manner. In particular, perhaps surprisingly at first sight, we show that the latter does not provide good approximations for the topology design problem: given any bounded-degree network (e.g., an expander graph) chosen in a demand-oblivious manner, there exist demands for which the optimal embedding into this network gives an expected path length that is an Ω(loglogn) factor more than the expected path length on the optimal host graph, for networks of size n.

As a contribution to the research community and to facilitate future work, we made available our simulation source code at https://github.com/inet-tub/DAN-balancing.

2 Preliminaries

Basic notation.

Let V be a node set and p:(V2)[0,1] a probability distribution given as input for the bounded network design problem. For nodes v,uV, we define

p(v)=uVp({v,u}),andpv(u)=p({v,u})/p(v).
Entropy.

Let X be a random variable with a finite domain 𝒳. Recall that the entropy and the base-d entropy of X, respectively, are

H(X) =x𝒳Pr(X=x)log2Pr(X=x)
and Hd(X) =x𝒳Pr(X=x)logdPr(X=x)

For any d, we have Hd(X)=H(X)/log2d. When X is distributed according to p:𝒳[0,1], we abuse the notation by writing H(p) for the entropy of X.

For random variables X and Y with finite domains 𝒳 and 𝒴, respectively, the (base-d) entropy of Y​ conditioned on X is

Hd(Y|X)=x𝒳y𝒴Pr((X,Y)=(x,y))logdPr(Y=yX=x)
Entropy bound on trees.

Consider a setting where we have a root node r, a set of nodes V, and demands between the root and nodes in V given by a probability distribution p:V[0,1], i.e., demand between r and vV is p(v). Suppose we want a tree rooted at r and including all nodes of V such that the expected path length between r and V, i.e., vVp(v)dT(r,v) is minimized. It is known that this is closely related to the entropy H(p).

Lemma 1 ([8, 30]).

Let {r}V be a set of nodes and let p:V[0,1] be a probability distribution. Then for any d-ary tree with root r and node set including {r}V, it holds that

vVp(v)dT(r,v)Hd+1(p)1.

Note that the above lemma covers cases where nodes in V can appear as either internal nodes or as leaves. If nodes in V are required to appear as leaves only, then this question is equivalent to asking for optimal prefix codes.

Lemma 2 (Huffman coding, e.g. [15, 33]).

Let {r}V be a set of nodes with |V|=n and let p:V[0,1] be a probability distribution. The d-ary tree T with root r with leaf set exactly V minimizing the expected path length vVp(v)dT(r,v) can be computed in time 𝒪(nlogn) and satisfies

Hd(p)vVp(v)dT(r,v)Hd(p)+1.
Entropy bound on graphs.

For the bounded network design problem, both with and without Steiner nodes, we use the following result to lower bound the cost of an optimal solution.

Theorem 3 ([8]).

Assume we have a degree bound Δ, a node set V={1,2,,n} and a probability distribution p:(V2)[0,1] over possible edges over set V. Then for any graph G=(VU,E) with maximum degree Δ, the expected path length between nodes of V satisfies

u,vVp({u,v})dG(u,v)12vVp(v)HΔ+1(pv)1.

Note that while there appears to be a factor 12 in the above inequality that is not present in the original formulation of Avin et al. [8]; this is simply due to the fact that we define the demand distribution over undirected edges rather than directed edges.

3 Hardness and lower bounds

3.1 NP-completeness

Consider the bounded network problem with integer weights in its decision form: is there a solution with expected path length at most some given value K? We show hardness for both the versions with and without Steiner nodes.

Theorem 4.

Bounded network design and bounded network design with Steiner nodes are NP-complete for any fixed Δ2.

Due to space constraints, we describe all the details in Appendix A. Here, we briefly comment on some main ideas. A first detail is that we verify that the version with Steiner nodes is in fact in NP; the subtlety here is that we need to show that a polynomial number of Steiner nodes suffices for an optimal solution.

For Δ=2, Steiner nodes are clearly not helpful, and so both variants are the same. NP-completeness follows easily from a variant of the minimum linear arrangement problem, namely undirected circular arrangement.

For Δ>3, we have to work harder. In Appendix A we give a reduction from vertex cover on 3-regular graphs utilizing multiple gadgets in the construction.

3.2 A lower bound for a universal host graph

We now return to the question of approximation algorithms for bounded network design without Steiner nodes. One possible approach one might consider is choosing a “universal” host graph of maximum degree Δ, e.g., a Δ-regular expander, and the solving the problem by embedding the demands into this universal host graph. We show in this section that this approach cannot yield a constant-factor approximation algorithm.

We will restrict our attention to uniform demand functions, and will henceforth simply refer to demand graphs with the implicit understanding that the demand function is uniform. The precise question we now want to ask is whether there exists a host graph G such that the following holds: given a demand graph D with n vertices, which has an optimal embedding into a host graph G(D) (with maximum degree Δ) of expected path length (D), we have an embedding into G of expected path length 𝒪((D)).

Theorem 5.

Let Δ2. For any host graph G=(V,E) of size n and maximum degree Δ, there exists some demand graph D with maximum degree Δ for which the optimal embedding of D into G has expected path length Ω(loglogn), where constants depending on Δ are hidden in the Ω.

Note that such a demand graph D trivially has an embedding into a graph of maximum degree Δ and with expected path length 1; simply use D itself.

Proof.

We consider Δ3; the claim is obvious for Δ=2, as the only connected host graphs are the n-path and the n-cycle, and a demand graph consisting of two cycles of length n/2 does not have a good embedding into either.

Let 𝒢Δ be the collection of Δ-regular graphs on V. We assume from hereon that Δn is even, since otherwise 𝒢Δ is empty. Standard results allow us to bound |𝒢Δ|. Asymptotically, the number of Δ-regular graphs (ignoring constants depending on Δ) is (see [13])

Θ((Δn)!(Δn/2)! 2Δn/2(Δ!)n)

Applying this gives us the lower bound

|𝒢Δ|=Ω((Δn/4)Δn/2ΔΔn)=Ω(2Δn(log(Δn)2)/2ΔlogΔn)

Suppose that for every graph D on V with maximum degree Δ, there is some embedding (that is, a permutation) πD that embeds D into G with an average stretch of at most :=loglogn/(200logΔ). Let 𝒢π:={D𝒢Δ:πD=π}, for any permutation π of V. There must be some permutation σ for which

|𝒢σ||𝒢Δ|/n!=Ω(2Δnlogn/2Δ(1+logΔ)nnlogn)

As long as Δ3, this is at least Ω(2Δnlogn/4).

We will restrict our attention to 𝒢σ going forward. Without loss of generality, we can assume σ is the identity.

Let G^=(V,E^) be the graph where {u,v}E^ whenever the shortest path distance between u and v in G at most 100.

Lemma 6.

G^ has fewer than 2100logΔn edges.

Proof.

For each vV, just from the degree bound for G we deduce that there are less than Δ100 nodes within distance 100 of v. From our choice of , this means that G^ has at most nlogn edges.

We consider every possible subgraph G of G^. For each such G, let

Γ(G):={D𝒢σ:E(D)E^=E(G)}

Since there are at most 2nlogn subgraphs of G^, it follows that there exists some subgraph G of G^ for which

|Γ(G)||𝒢σ|/2nlogn=Ω(2Δnlogn/4nlogn) (2)

For each DΓ(G), given that the average stretch of D is at most , we have by Markov’s inequality that at most 1/100 fraction of the edges of D have stretch more than 100. That is, |E(D)E^||E(D)|/100Δn/200. This means we can describe D in an efficient way: its edge set consists of E(G), along with at most Δn/200 other edges.

Considering that we can describe every DΓ(G) in such a way, we deduce that |Γ(G)| is at most the number of ways of choosing a subset of at most Δn/200 edges from the collection of (n2) pairs. Hence

|Γ(G)|(n2)Δn/200nΔn/100=2Δnlogn/100

This contradicts (2).

4 Approximation with Steiner nodes

In this section, we give a constant-factor approximation algorithm for the bounded network design with Steiner nodes. Let Δ be the degree bound, V={1,2,,n} the set of nodes and p:(V2)[0,1] the probability distribution given as input. Let m denote the number of demand edges.

Approximation algorithm.

We now present the approximation algorithm itself. The algorithm constructs the host graph in two simple steps: first, for each node vV separately, we construct a Huffman tree for the distribution pv, i.e., the conditional distribution of the other endpoint given that v is included in the demand edge. Second, we connect these trees together to obtain the final host graph.

In more detail, the algorithm constructs the host graph G as follows:

  1. 1.

    For each node vV, let Tv be the (Δ1)-ary Huffman tree for probability distribution pv, ignoring any probabilities of 0. Denote the leaf node corresponding to probability pv(u) as tv,u, and let dTv(v,tv,u) be the distance from v to tv,u in Tv.

    In the special case that pv(u)=1 for some uV, we take Tv to be a tree with a root and a single leaf instead of the trivial tree.

  2. 2.

    For each pair {u,v}V with p({u,v})0, we add an edge between the parent of tv,u in Tv and the parent of tu,v in Tu, and remove the nodes tv,u and tu,v.

See Figure 1 for illustration.

Refer to caption
Figure 1: Approximation algorithm for bounded network design with Steiner nodes. In Step (1), a Huffman tree is constructed for all nodes; the leaf nodes marked by squares are not included in the final host graph. In Step (2), the corresponding leaf nodes are deleted and replaced by an edge.
Time complexity.

To analyze the time complexity of the approximation algorithm, we first observe that constructing the Huffman tree in Step (1) for node v takes 𝒪(dvlogdv) time, where dv=degD(v) is the degree of v in the demand graph. We have

vVdvlog2dvlog2mvVdv=2mlog2m,

and thus constructing Huffman trees for all nodes takes 𝒪(mlogn) time in total. Step (2) can clearly also be implemented in 𝒪(mlogn) time, so the total time complexity is 𝒪(mlogn).

Cost of solution.

Consider a graph G as constructed above. By construction, we have

dG(u,v)=dTv(v,tv,u)+dTu(u,tu,v)1

for all u,vV. Thus, the expected path length between nodes in V in G is

{u,v}(V2)p({u,v})(dTv(v,tv,u)+dTu(u,tu,v)1)
= vVuV{v}p({u,v})dTv(v,tv,u){u,v}(V2)p({u,v})
= vVp(v)uVpv(u)dTv(v,tv,u)1
vVp(v)(HΔ1(pv)+1)1
= vVp(v)HΔ1(pv)+vVp(v)1
= vVp(v)HΔ1(pv)+1:=C

The expected path length C of an optimal solution is 12vVp(v)HΔ+1(pv)1 or greater by Theorem 3. Comparing this to the expected path length upper bound C on G, we have that the approximation factor of the algorithm is 2log2(Δ+1)log2(Δ1)+o(1). Note that 2log2(Δ+1)log2(Δ1) is at most 4 for all Δ3, and at most 3 for all Δ4.

Number of nodes.

Let n=|V| and let m be the number of non-zero entries in p. We now want to analyze the total number of nodes in VU in the graph G given by the above algorithm.

Fact 7 (e.g. [27]).

Given a d-ary Huffman tree T, the leaves can be rearranged so that all internal nodes of T have exactly d children, with the exception of one internal node located at the maximum distance from the root. This node has at least 2 children.

Fact 8.

A full d-ary tree with leaves has 1d1 internal nodes.

Now consider the Huffman tree Tv constructed in Step (1) of the algorithm. Let d=Δ1 be the arity of the Huffman trees. Denoting the outdegree of v in p by deg(v), and assuming deg(v)2, we have that Tv has deg(v) leaves. By Fact 7, we can turn Tv into a full d-ary tree by adding at most d2 leaves, which has deg(v)+d2 leaves. By Fact 8 it has at most

1d1deg(v)1+d2d1=deg(v)2d1+1

internal nodes; this is also an upper bound for the number of internal nodes in Tv.

In the special case deg(v)=1, the above bound does not hold. However, we can use a slightly looser bound of deg(v)1d1+1 to cover all cases.

Since the leaf nodes of the Huffman trees Tv are deleted in Step 2 of the algorithm, the total number of nodes in G is the total number of internal nodes in these trees – note that the roots of the trees Tv correspond to the original nodes in V. Thus, the number of nodes in G is at most

vV(deg(v)1d1+1)=(11d1)n+vVdeg(v)d1(11d1)n+2d1m (3)

5 Applications

This section discusses applications of our approach. First, we will use it to derive improved approximation bounds for the original demand-aware network design problem which results in a constant-factor approximation for the case where the maximum degree is close the average degree of the demand graph. Second, we show how it can be used to obtain efficient heuristics.

5.1 Improved approximation algorithm for demand balancing

In this section, we use the ideas from our approximation algorithm for bounded network design with Steiner nodes to design a demand balancing algorithm in the spirit of the results of Avin et al. [8]. That is, we consider a demand graph with average degree Δavg, but with possibly some nodes with very high degree, and we want to design a host graph without Steiner nodes that has maximum degree close to Δavg.

Here, we give an improved version of Theorem 4 of [8], showing how to construct a host graph with maximum degree 4Δavg+1 and better expected path length guarantees. Specifically, we improve the maximum degree guarantee from 12Δavg to 4Δavg+1 and the expected path length guarantee by a factor of log2(2Δavg), which results in a constant-factor approximation.

5.1.1 Algorithm

For technical convenience, we assume Δavg is an integer and n is divisible by 2. We say that a node v is a high-degree node if its degree deg(v) in the demand graph satisfies deg(v)>2Δavg, and otherwise we say it is a low-degree node. By Markov’s inequality, the number of high-degree nodes is at most n/2.

For each node v, we say that the up to 2Δavg demand graph edges {u,v} for which pv(u) are highest are the high-demand edges for v, and the rest of the edges are low-demand edges for v. Note that only heavy nodes have low-demand edges.

We now construct the host graph G=(V,E) in two steps as follows.

Step 1: Low-demand trees.

For a heavy node v, let Lv and Hv be the set of neighbours u of v in the demand graph such that {u,v} is low-demand and high-demand, respectively. Define a distribution qv on Lv by selecting an arbitrary node sLv and setting

qv(u)={pv(u)+wHvpv(w)if u=s, andpv(u)otherwise.

As in Section 4, we construct a 2Δavg-ary Huffman tree for terminal set Lv wrt. the probabilities qv(u). As before, denote the leaf node corresponding to probability u as tv,u, and let dTv(v,tv,u) be the distance from v to tv,u in Tv.

We repeat the construction for all heavy nodes, and map the internal nodes of the trees injectively to nodes of V so that root of the tree for v is v. We then add all edges of the tree to the routing graph G. This is always possible, since by applying (3) with N=n/2, M=Δavgn/2, and d=2Δavg, we have that there are at most n internal nodes, including the roots, in the constructed trees.

Step 2: Connecting edges.

Now consider edge {u,v} in the demand graph. There are three cases to consider:

  1. 1.

    Edge {u,v} is high-demand for both u and v. In this case, we add edge {u,v} to G.

  2. 2.

    Edge {u,v} is low-demand for both u and v. In this case, we add an edge from the parent node of tv,u to the parent node of tu,v to G.

  3. 3.

    Otherwise, without loss of generality, edge {u,v} is high-demand for u and low-demand for v. In this case, we add an edge from u to the parent of tv,u to G.

5.1.2 Analysis

Time complexity.

By the same argument as in Section 4, we can see that computing the high-demand edges and building the Huffman trees for low-demand edges can be done in time 𝒪(mlogn) in total. All other steps of the algorithm can be implemented with at most 𝒪(mlogn) time.

Maximum degree.

Low-demand trees constructed in Step 1 have arity 2Δavg, and thus contribute at most 2Δavg+1 to the degree of each node. This includes edges added for low-demand edges. Moreover, each node has at most 2Δavg edges added for handling high-demand edges, for a total of 4Δavg+1.

Expected path length.

Here we show that the expected path length in G is at most uVp(u)H2Δavg(pu)+1. First, let us recall the grouping rule for entropy.

Lemma 9.

Let p:{1,2,,m} be a distribution, and let q:{1,2,,m1} be a distribution defined by q(i)=p(i) for i=1,2,,m1, and q(m1)=p(m1)+p(m). Then

Hd(p)=Hd(q)+(p(m1)+p(m))Hd(p(m1)p(m1)+p(m),p(m)p(m1)+p(m))

It follows immediately from Lemma 9 that for a heavy node v we have Hd(qv)Hd(pv) for any d2.

Now consider a non-zero demand {u,v}. There are four cases to consider for the distance between u and v in G:

  1. 1.

    uHv,vHu: distance is dG(u,v)=1.

  2. 2.

    uHv,vLu: distance is dG(u,v)=dTu(u,tu,v).

  3. 3.

    uLv,vHu: distance is dG(u,v)=dTv(v,tv,u).

  4. 4.

    uLv,vLu: distance is dG(u,v)=dTv(v,tv,u)+dTu(u,tu,v)1.

Let D be the set of demand edges, i.e., edges with non-zero demand. For a predicate P, denote by [P] a function that is [P]=1 if predicate P is true, and [P]=0 otherwise. The expected path length in G is now

{u,v}Dp({u,v})([uHv][vHu]+[uHv][vLu]dTu(u,tu,v)+[uLv][vHu]dTv(v,tv,u)+[uLv][vLu](dTv(v,tv,u)+dTu(u,tu,v)1)).

By re-grouping terms, this is equal to

{u,v}Dp({u,v})(dTv(v,tv,u)([uHv][vLu]+[uLv][vHu])
+dTu(u,tu,v)([uHv][vLu]+[uLv][vLu])
+[uHv][vHu][uLv][vLu]).

By omitting the last negative term, and rearranging further, this is at most

uVvLuHup({u,v})(dTu(u,tu,v)([uHv][vLu]
+[uLv][vLu])+[uHv][vHu])
uV(vLup({u,v})dTu(u,tu,v)+vHup({u,v}))
uVp(u)(vLupu(v)dTu(u,tu,v)+vHupu(v)).

For fixed uV, we have

vLupu(v)dTu(u,tu,v)+vHupu(v)
vLupu(v)dTu(u,tu,v)+vHupu(v)dTu(u,tu,s)
=vLu{s}pu(v)dTu(u,tu,v)+(pu(s)+vHupu(v))dTu(u,tu,s)
=vLuqu(v)dTu(u,tu,v)
H2Δavg(qu)+1H2Δavg(pu)+1.

Thus, the expected path length in G is at most

uVp(u)H2Δavg(pu)+1.

In comparison, by Theorem 3 the expected path length for degree-(4Δavg+1) host graphs is at least 12uVp(u)H4Δavg+2(pu), meaning that G is a constant-factor approximation for the optimal degree-(4Δavg+1) host graph.

5.2 Fixed-degree heuristics

The main challenge of our methods, as well as the prior work, is that we do not have approximation algorithms for bounded network designs that strictly respect a given arbitrary degree bound, without using additional resources such as Steiner nodes. However, in practice we expect that parameters such as the degree bound and number of Steiner nodes are limited by the physical properties of the network infrastructure, so solutions respecting these limitations would be required.

We describe a few heuristics which although do not have any guarantees on the quality of their solution, nevertheless appeared to have worked well in our experiments.

Fixed-degree heuristic.

We choose a subset of edges from the demand graph with large weights and use the Steiner node insertion algorithm to construct a DAN with maximum degree Δ3 for these edges. The number of picked edges is low enough to guarantee that we only need at most n nodes for the construction of the DAN. Lastly, a randomly chosen (almost) 3-regular graph is overlaid on top of this DAN.

Random tree and random graph.

We simply pick a randomly chosen Δ1-ary tree or (nearly) Δ regular graph as the demand aware graph. This is oblivious to the actual demand, but tends to have low diameter.

Greedy edge deletion.

We initially use the demand graph as the DAN. We iteratively delete edges of low weight incident on vertices with degree greater than the degree bound Δ. Deleting an edge may disconnect the graph and result in infinite expected path length. We do not delete edges if it would disconnect the graph, but as a result we may violate the degree bound Δ, in which case we say the algorithm failed.

Greedy edge selection.

We start with an empty DAN and iteratively add edges from the demand graph starting with the ones with highest weight. We do not add an edge if it would exceed the degree bound Δ. The algorithm may fail to construct a connected graph.

6 Empirical Evaluation

In this section we complement our theoretical insights with empirical evaluations using datacenter traces.

6.1 Methodology

All presented algorithms in this paper were implemented and evaluated in simulations. Furthermore, we provide comparisons to other methods such as the algorithm for sparse distributions from Theorem 4 by Avin et al. [8], which we will refer to as the Helper algorithm, and a k-root graph approach by Peres and Avin [34], where k=logΔ(D), where Δ(D) is the maximum degree in the demand graph, which we will refer to as the Split&Join algorithm. For a full overview of the algorithms used in the experiments see Table 1.

Unfortunately, obtaining optimal solutions for our problem using integer linear programming was not feasible. We need 𝒪(n2) binary variables representing each possible edge in the output graph and for modeling the expected path length in the resulting graph we needed a cubic number of integer variables. Solving these ILPs was feasible for only very small instances.

Table 1: Overview of the algorithms used in the experiments. The Steiner nodes column refers to whether an algorithm solves the bounded network design problem with or without Steiner nodes.
Name Shorthand Ref. ​Steiner nodes​ Δ as input​
​​Steiner Node Insertion​​ SNI Section 4 yes yes
Demand Balancing DB Section 5.1 no no
Split&Join S&J Split&Join [34] no no
Helper Help ​Theorem 4 in [8] no no
Fixed-degree Fix-Deg Section 5.2 no yes
Random Tree Rnd-Tree Section 5.2 no yes
Random Graph Rnd-Graph Section 5.2 no yes
​​Greedy Edge Deletion GED Section 5.2 no yes
​​Greedy Edge Selection​​ GES Section 5.2 no yes
Dataset.

For the experiments we used the real-world datacenter trace collection from Avin et al. [5] that was also used by previous works [10, 34, 8]. These traces contain temporal data, specifically source, destination and timestamps of communicating nodes. To adapt these traces to our demand graph input format, we create an edge between two communicating nodes and set its weight equal to number of times the nodes communicated. The weights are normalized so that this can be interpreted as a communication distribution (demand). In Appendix B in Table 4 some selected parameters of these instances are summarized.

6.2 Results

We divide the results of the experiments into three groups, based on the algorithms which they involve, similar to the grouping in Table 1.

Sparse heuristics.

We first focus our attention on the bounded network design heuristics for which the maximum degree is a function of the input demand graph and cannot be specified by the user. In Table 2 properties of the resulting host graphs computed by these algorithms on our network trace dataset are presented. The Helper heuristic appeared to have the highest expected path length and second largest maximum degree compared to the other three approaches. In contrast, the Demand Balancing heuristic achieved the lowest expected path length while also having the lowest maximum degree, except for three demand graphs. For four of the ten demand graphs the expected path lengths for the Demand Balancing and Split&Join heuristics were almost a third of the expected path length of the Helper heuristic. The Split&Join heuristic achieved a low expected path length, but at the cost of having a comparatively large maximum degree, almost double that of the Demand Balancing heuristic for three demand graphs.

Table 2: Properties of the host graphs computed by the Split&Join, Helper, Demand Balancing (DB) heuristics. We denote by Δ the maximum degree in the host graph and by EPL its expected path length. For each trace we highlight in gray the lowest maximum degree and in yellow the lowest expected path length, unless there is a tie.
Split&Join Helper DB
Trace Δ EPL Δ EPL Δ EPL
fb-cluster-rack-A 507 1.33 399 3.26 290 1.31
fb-cluster-rack-B 1,305 1.06 855 4.25 754 1.05
fb-cluster-rack-C 1,460 1.14 870 3.51 683 1.08
hpc-cesar-mocfe 21 1.33 18 2.87 21 1.0
hpc-cesar-nekbone 39 1.07 36 1 36 1
hpc-boxlib-cns 157 1.11 102 1.04 293 1.01
hpc-boxlib-multigrid 31 1.12 26 1 26 1
p-fabric-trace-0-1 143 1.01 144 1 144 1
p-fabric-trace-0-5 143 1.01 143 1 143 1
p-fabric-trace-0-8 143 1.01 143 1 143 1
Fixed degree heuristics.

We next compare different heuristics for which the maximum degree is an input parameter. In Figure 2 the average expected path length over our whole dataset is plotted against the maximum degree constraint for different heuristics. It is apparent that the two heuristics that are oblivious to the demand graph, namely the Random Tree and Random Graph heuristics have the worst expected path length, which was expected to due their obliviousness to the input.

Figure 2: Average expected path length over the whole datacenter trace dataset depending on the maximum desired degree Δ. The results for the Random Tree, Random Graph, Fixed-degree, and Steiner Node Insertion heuristics are depicted. The results are averaged over 10 different runs. Heuristics which sometimes failed are not depicted.

Unsurprisingly, the Random Tree heuristic is significantly worse than for example the Random Graph heuristic. The randomly constructed (Δ1)-ary tree has many leaves which by definition have a degree of one, and are thus poorly utilized as more edges could be inserted to improve the EPL.

In Table 3 we present results from Figure 2 for the case Δ=32 in more detail, and also include some results for heuristics which failed do solve some instances. For the Facebook instances the Fixed-degree heuristic has the lowest expected path length. For some demands the heuristics achieve an expected path length of almost one, whereas the Random Graph and Tree heuristics have at least double the expected path length. The Greedy Edge Deletion and Greedy Edge Selection fail on the Facebook instances.

Table 3: Summary of the expected path length of the host graphs computed by the Fixed-degree, Random Tree, Random Graph, Greedy Edge Deletion, and Greedy Edge Selection heuristics for Δ=32. If an algorithm failed on some instance then it is replaced with a “—” symbol. For each trace we highlight in gray the lowest expected path length, unless there is a tie.
Trace Fix-Deg Rnd Graph Rnd Tree GED GES
fb-cluster-rack-A 2.6 3.02 5.72
fb-cluster-rack-B 2.48 3.13 5.78
fb-cluster-rack-C 2.69 3.28 5.86
hpc-cesar-mocfe 1 2.32 3.87 1 1
hpc-cesar-nekbone 1.01 2.32 3.87 1 1
hpc-boxlib-cns 2.2 2.33 3.87 1.88 1.85
hpc-boxlib-multigrid 1 2.32 3.87 1 1
p-fabric-trace-0-1 1.37 1.78 3.22 1.29
p-fabric-trace-0-5 1.41 1.77 3.21 1.28 1.27
Steiner nodes.

Our last experiments involve the Steiner Node Insertion algorithm. Recall, that the Steiner Node Insertion algorithm is allowed to use additional nodes (Steiner nodes) that are not present in the demand graph. For a relatively low maximum degree of eight the number of new nodes used by the algorithm is sometimes even greater than 30n. As the maximum degree increases, the expected path length decreases and so does the number of used Steiner nodes. For some traces the number of Steiner nodes remains quite high. For example, for Δ=64 on the second Facebook trace the algorithm used 2.7n Steiner nodes.

Furthermore, in Figure 2 we compare the Steiner Node Insertion algorithm to the Fixed-degree heuristic which utilizes the Steiner Node Insertion algorithm, but does not use Steiner nodes; that is, it computes a host graph with the same vertex set as the demand graph. It can be observed that the Steiner Node Insertion algorithm achieves a slightly lower expected path length on average, but as can be seen in Table 5 (Appendix B) this is at the cost of utilizing many Steiner nodes. The Fixed-degree does not utilize Steiner nodes, but the expected path length is marginally larger.

7 Conclusion

This paper presented new approaches to designing bounded-degree demand-aware networks, leading to improved approximation algorithms as well as heuristics for variants of the problem. We also presented various hardness results and lower bounds. From the extensive empirical evaluation, we highlight our fixed-degree heuristic as a practical algorithm for bounded-degree network design problem; it is guaranteed to respect the given degree bound regardless of the demand distribution and, in experiments, achieves expected paths lengths close to optimal on real-world instances.

Our work leaves open several interesting directions for future research. In particular, it will be interesting to explore the tradeoff between approximation quality and resource augmentation. More generally, it remains open whether a constant-factor approximation algorithm exists for bounded-degree network design without augmentation.

References

  • [1] Vamsi Addanki, Chen Avin, and Stefan Schmid. Mars: Near-optimal throughput with shallow buffers in reconfigurable datacenter networks. Proc. ACM Meas. Anal. Comput. Syst., 7(1), March 2023. doi:10.1145/3579312.
  • [2] Daniel Amir, Nitika Saran, Tegan Wilson, Robert Kleinberg, Vishal Shrivastav, and Hakim Weatherspoon. Shale: A practical, scalable oblivious reconfigurable network. In Proceedings of the ACM SIGCOMM 2024 Conference, ACM SIGCOMM ’24, pages 449–464, New York, NY, USA, 2024. Association for Computing Machinery. doi:10.1145/3651890.3672248.
  • [3] Daniel Amir, Tegan Wilson, Vishal Shrivastav, Hakim Weatherspoon, Robert Kleinberg, and Rachit Agarwal. Optimal oblivious reconfigurable networks. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2022, 2022. doi:10.1145/3519935.3520020.
  • [4] Chen Avin, Manya Ghobadi, Chen Griner, and Stefan Schmid. On the complexity of traffic traces and implications. In Proc. ACM SIGMETRICS, 2020.
  • [5] Chen Avin, Manya Ghobadi, Chen Griner, and Stefan Schmid. On the complexity of traffic traces and implications. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4(1):1–29, 2020. doi:10.1145/3379486.
  • [6] Chen Avin, Alexandr Hercules, Andreas Loukas, and Stefan Schmid. rDAN: Toward robust demand-aware network designs. Information Processing Letters, 133:5–9, 2018. doi:10.1016/J.IPL.2017.12.008.
  • [7] Chen Avin, Kaushik Mondal, and Stefan Schmid. Demand-aware network designs of bounded degree. In Proc. International Symposium on Distributed Computing (DISC), 2017.
  • [8] Chen Avin, Kaushik Mondal, and Stefan Schmid. Demand-aware network designs of bounded degree. Distributed Computing, 33(3):311–325, 2020. doi:10.1007/S00446-019-00351-5.
  • [9] Chen Avin, Kaushik Mondal, and Stefan Schmid. Demand-aware network design with minimal congestion and route lengths. IEEE/ACM Transactions on Networking, 30(4):1838–1848, 2022. doi:10.1109/TNET.2022.3153586.
  • [10] Chen Avin and Stefan Schmid. Renets: Statically-optimal demand-aware networks. In Symposium on Algorithmic Principles of Computer Systems (APOCS), pages 25–39. SIAM, 2021. doi:10.1137/1.9781611976489.3.
  • [11] Chen Avin and Stefan Schmid. Renets: Statically-optimal demand-aware networks. In Proc. SIAM Symposium on Algorithmic Principles of Computer Systems (APOCS), 2021.
  • [12] Hitesh Ballani, Paolo Costa, Raphael Behrendt, Daniel Cletheroe, Istvan Haller, Krzysztof Jozwik, Fotini Karinou, Sophie Lange, Kai Shi, Benn Thomsen, et al. Sirius: A flat datacenter network with nanosecond optical switching. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, pages 782–797, 2020.
  • [13] Edward A Bender and E. Rodney Canfield. The asymptotic number of labeled graphs with given degree sequences. Journal of Combinatorial Theory, Series A, 24(3):296–307, 1978. doi:10.1016/0097-3165(78)90059-6.
  • [14] NM Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. Virtual network embedding with coordinated node and link mapping. In IEEE INFOCOM 2009, pages 783–791. IEEE, 2009.
  • [15] Thomas M. Cover and Joy A. Thomas. Elements of information theory. Wiley-Interscience, 2006.
  • [16] Fred Douglis, Seth Robertson, Eric Van den Berg, Josephine Micallef, Marc Pucci, Alex Aiken, Maarten Hattink, Mingoo Seok, and Keren Bergman. Fleet—fast lanes for expedited execution at 10 terabits: Program overview. IEEE Internet Computing, 25(3):79–87, 2021. doi:10.1109/MIC.2021.3075326.
  • [17] Nathan Farrington and Alexey Andreyev. Facebook’s data center network architecture. In 2013 Optical Interconnects Conference, pages 49–50. IEEE, 2013.
  • [18] Aleksander Figiel, Leon Kellerhals, Rolf Niedermeier, Matthias Rost, Stefan Schmid, and Philipp Zschoche. Optimal virtual network embeddings for tree topologies. In Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, pages 221–231, 2021. doi:10.1145/3409964.3461787.
  • [19] Aleksander Figiel, Darya Melnyk, Andre Nichterlein, Arash Pourdamghani, and Stefan Schmid. Spiderdan: Matching augmentation in demand-aware networks. In SIAM Symposium on Algorithm Engineering and Experiments (ALENEX), 2025.
  • [20] M. R. Garey, D. S. Johnson, and L. Stockmeyer. Some simplified NP-complete graph problems. Theoretical Computer Science, 1(3):237–267, 1976. doi:10.1016/0304-3975(76)90059-1.
  • [21] Michael R. Garey and David S. Johnson. Computers and Intractability. W.H. Freeman and Company, 1979.
  • [22] Monia Ghobadi, Ratul Mahajan, Amar Phanishayee, Nikhil Devanur, Janardhan Kulkarni, Gireeja Ranade, Pierre-Alexandre Blanche, Houman Rastegarfar, Madeleine Glick, and Daniel Kilper. Projector: Agile reconfigurable data center interconnect. In Proceedings of the 2016 ACM SIGCOMM Conference, pages 216–229. ACM, 2016. doi:10.1145/2934872.2934911.
  • [23] Chen Griner, Johannes Zerwas, Andreas Blenk, Manya Ghobadi, Stefan Schmid, and Chen Avin. Cerberus: The power of choices in datacenter topology design (a throughput perspective). Proc. ACM Meas. Anal. Comput. Syst., 5(3), December 2021. doi:10.1145/3491050.
  • [24] Matthew Nance Hall, Klaus-Tycho Foerster, Stefan Schmid, and Ramakrishnan Durairajan. A survey of reconfigurable optical networks. Optical Switching and Networking, 41:100621, 2021. doi:10.1016/J.OSN.2021.100621.
  • [25] Navid Hamedazimi, Zafar Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, and Ashish Tanwer. Firefly: a reconfigurable wireless data center fabric using free-space optics. SIGCOMM Comput. Commun. Rev., 44(4):319–330, August 2014. doi:10.1145/2740070.2626328.
  • [26] Monika Henzinger, Stefan Neumann, and Stefan Schmid. Efficient distributed workload (re-) embedding. Proc. ACM SIGMETRICS, 2019.
  • [27] Stefan Höst. Information and Communication Theory. Wiley-IEEE Press, 2019.
  • [28] Wolfgang Kellerer, Patrick Kalmbach, Andreas Blenk, Arsany Basta, Martin Reisslein, and Stefan Schmid. Adaptable and data-driven softwarized networks: Review, opportunities, and challenges. Proceedings of the IEEE, 107(4):711–731, 2019. doi:10.1109/JPROC.2019.2895553.
  • [29] Vincenzo Liberatore. Circular arrangements. In Proc. International Colloquium on Automata, Languages, and Programming (ICALP 2002), pages 1054–1065. Springer, 2002. doi:10.1007/3-540-45465-9_90.
  • [30] Kurt Mehlhorn. Nearly optimal binary search trees. Acta Informatica, 5(4):287–295, 1975. doi:10.1007/BF00264563.
  • [31] William M Mellette, Rajdeep Das, Yibo Guo, Rob McGuinness, Alex C Snoeren, and George Porter. Expanding across time to deliver bandwidth efficiency and low latency. In Proc. 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 1–18, 2020. URL: https://www.usenix.org/conference/nsdi20/presentation/mellette.
  • [32] William M Mellette, Rob McGuinness, Arjun Roy, Alex Forencich, George Papen, Alex C Snoeren, and George Porter. Rotornet: A scalable, low-complexity, optical datacenter network. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pages 267–280. ACM, 2017. doi:10.1145/3098822.3098838.
  • [33] Alistair Moffat. Huffman coding. ACM Computing Surveys, 52(4), 2019. doi:10.1145/3342555.
  • [34] Or Peres and Chen Avin. Distributed demand-aware network design using bounded square root of graphs. In IEEE Conference on Computer communications (INFOCOM). IEEE, 2023. doi:10.1109/INFOCOM53939.2023.10228932.
  • [35] Arash Pourdamghani, Chen Avin, Robert Sama, Maryam Shiran, and Stefan Schmid. Hash & adjust: Competitive demand-aware consistent hashing. In International Conference on Principles of Distributed Systems (OPODIS), 2024. doi:10.4230/LIPIcs.OPODIS.2024.24.
  • [36] Leon Poutievski, Omid Mashayekhi, Joon Ong, Arjun Singh, Mukarram Tariq, Rui Wang, Jianan Zhang, Virginia Beauregard, Patrick Conner, Steve Gribble, et al. Jupiter evolving: transforming google’s datacenter network via optical circuit switches and software-defined networking. In Proc. ACM SIGCOMM 2022 Conference, pages 66–85, 2022.
  • [37] Matthias Rost and Stefan Schmid. Virtual network embedding approximations: Leveraging randomized rounding. IEEE/ACM Transactions on Networking, 27(5):2071–2084, 2019. doi:10.1109/TNET.2019.2939950.
  • [38] D.D. Sleator and R.E. Tarjan. Self-adjusting binary search trees. Journal of the ACM (JACM), 32(3):652–686, 1985. doi:10.1145/3828.3835.
  • [39] Min Yee Teh, Zhenguo Wu, and Keren Bergman. Flexspander: augmenting expander networks in high-performance systems with optical bandwidth steering. IEEE/OSA Journal of Optical Communications and Networking, 12(4):B44–B54, 2020. doi:10.1364/JOCN.379487.
  • [40] Tegan Wilson, Daniel Amir, Nitika Saran, Robert Kleinberg, Vishal Shrivastav, and Hakim Weatherspoon. Breaking the vlb barrier for oblivious reconfigurable networks. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, 2024. doi:10.1145/3618260.3649608.
  • [41] Johannes Zerwas, C Gyorgyi, A Blenk, Stefan Schmid, and Chen Avin. Duo: A high-throughput reconfigurable datacenter network using local routing and control. In Proc. ACM SIGMETRICS, 2023.
  • [42] Mingyang Zhang, Jianan Zhang, Rui Wang, Ramesh Govindan, Jeffrey C Mogul, and Amin Vahdat. Gemini: Practical reconfigurable datacenter networks with topology and traffic engineering. CoRR, 2021. arXiv:2110.08374.

Appendix A Hardness of bounded-degree network design

Decision version of bounded-degree network design.

In this section, we show that the decision versions of bounded-degree network design, with or without Steiner nodes, is NP-complete for any fixed degree bound Δ2. Formally, the decision version bounded of bounded-degree network design is defined as follows – note that we consider an integer-weighted version of the problem to sidestep considerations regarding encoding of small fractional number:

Instance:

A set V with |V|=n, a weight function w:(V2), positive integers Δ and K.

Question:

Is the a graph G=(V,E) such that maximum degree of G is at most Δ and

{u,v}(V2)w({u,v})dG(u,v)K,

where dG(u,v) denotes the distance between u and v in G.

The decision version of bounded-degree network design with Steiner nodes is defined analogously:

Instance:

A set V with |V|=n, a weight function w:(V2), positive integers Δ and K.

Question:

Is there a graph G=(V,E) such that VV, the maximum degree of G is at most Δ, and

{u,v}(V2)w({u,v})dG(u,v)K,

where dG(u,v) denotes the distance between u and v in G?

While it is immediately clear that bounded-degree network design without Steiner nodes is in NP, it is not a priori clear that the version with Steiner nodes always has optimal host graphs of polynomial size. However, not surprisingly this is indeed the case:

Lemma 10.

For any instance of bounded-degree network design problem with Steiner nodes, there is a solution with optimal effective path length and at most a polynomial number of Steiner nodes.

Proof.

For Δ=2, one can immediately observe that there is a solution with optimal effective path length without Steiner nodes, as we can replace any degree-2 Steiner node with an edge. Thus, assume Δ3 and let G=(VU,E) be a host graph with optimal effective path length for an instance of bounded-degree network design with Steiner nodes. Moreover, assume that G is minimal in the sense that any proper subgraph of G has larger effective path length.

Let u,vV be arbitrary pair of nodes with non-zero demand between them and distance 4 in G, and consider the shortest path P=(u,v1,v2,,vl1,v) between u and v in G. Let s,tV be an another pair of nodes with non-zero demand between them, possibly including either u or v but not both. We say that an edge e with exactly one endpoint on P is critical for s and t if removing it from G would increase the distance between s and t.

Consider a shortest path P=(s=u0,u1,u2,,uk1,uk=t) between s and t that intersects with P, and let ui and uj be the first and the last node on P that is also on P, respectively. As both P and P are shortest paths, the distance between ui and uj must be the same along P and P. It follows that only {ui1,ui} and {uj,uj+1} can be critical for s and t, if they exist. Moreover, a critical edge must be on all shortest paths between s and t, so there can be at most two critical edges for s and t.

Now consider an arbitrary edge eE with exactly one endpoint on P. By minimality of G, deleting e would increase the distance between some pair {s,t}V; thus, edge e is critical for some s and t. By choice of e, it follows that all edges with exactly one endpoint on G are critical for some s and t. By above argument, there are at most 2(n2)n2 critical edges, and thus at most that many edges with exactly one endpoint on P.

Assume for the sake of contradiction that n2+3. Since there are at most n2 edges with exactly one endpoint on P, there exist two non-adjacent nodes on P that have degree less than Δ. Adding an edge between these two nodes to G would decrease the effective path length, which contradicts the optimality of G. Moreover, since u and v were chosen arbitrarily, it holds that for all pairs u,vV with non-zero demand the distance between u and v in G is O(n2). By minimality of G, it follows that G has at most O(n4) nodes.

NP-completeness for 𝚫=𝟐.

For degree bound Δ=2 one can easily observe that, for both versions of the bounded-degree network problem, there is an optimal host graph that is a collection of cycles. Moreover, it is clear that Steiner nodes cannot improve the solution for Δ=2.

Avin et al. [8] have noted that for connected demand graphs, the bounded-degree network design problem for Δ=2 is very close to minimum linear arrangement. More precisely, we can reduce from the undirected circular arrangement problem, known to be NP-complete [29], to prove that bounded-degree network design problems are NP-complete:

Instance:

Graph G=(V,E) with |V|=n, a weight function w:E, a positive integer K.

Question:

Is there a bijection f:V{1,2,,n} such that

eEw(e)h(e)K,

where h({u,v})=min(f(u)f(v)modn,f(v)f(u)modn) .

The circular arrangement problem can be seen as an instance of bounded-degree network design where the host graph is required to be a cycle. In particular, circular arrangement is equivalent to bounded-degree network design with Δ=2 on connected instances, as in that case the host graph is also required to be connected – i.e., a path or a cycle. Thus, the NP-completeness for both versions of bounded-degree network design follows from the following observation:

Lemma 11.

Undirected circular arrangement problem is NP-complete when restricted to connected graphs.

Proof.

Membership in NP is trivial. For NP-hardness, we reduce from undirected circular arrangement on general inputs.

Let G=(V,E), w and K be an instance of undirected circular arrangement. We construct a new instance by letting G=(V,E) be a complete graph on V, and define the new edge weight function w as

w(e)={n3w(e)if eE, and 1if eE.

Finally, we set K=n3(K+1)1. Clearly G is a connected graph.

First consider the case where G is a yes-instance, and let f be a solution satisfying eEw(e)h(e)K. Using f as a solution for G and summing over the edges in E, we have that eEw(e)h(e)n3K. For edges not in E, we have

eEw(e)h(e)(n2)n<n3.

Thus,

eEw(e)h(e)=eEw(e)h(e)+eEw(e)h(e)<n3K+n3,

which is at most n3(K+1)1 as the value of the sum is an integer. Hence, G is a yes-instance.

For the other direction, assume that G a yes-instance, and let f be a solution satisfying eEw(e)h(e)K. This implies that

eEw(e)h(e)K=n3(K+1)1.

Since all edge weights w(e) for eE are divisible by n3, the value of eEw(e)h(e) is also divisible by n3. This combined with above inequality implies

eEn3w(e)h(e)n3K,

and thus we have

eEw(e)h(e)K.

Hence, G is a yes-instance.

NP-completeness for 𝚫𝟑.

We prove NP-hardness for both variants of the bounded-degree network design problem. There are two main tricks we utilize in this proof, which we explain before proceeding with the proof proper.

First is the observation that when we construct instances for these problems, we can force any optimal host graph to have some specific edge {u,v} we desire by giving this pair a large demand p({u,v})=W. If we then have k edges we want to force, we can set the cost threshold of the instance to be between kW and kW1, so that any valid host graph will necessarily include all of these edges.

The second trick is used to ensure that nodes in our gadget constructions have the desired degrees. We use the following simple lemma:

Lemma 12.

Let d3 be an odd integer. There is a graph Hd=(V,E) such that |V|=d+2, one node in Hd has degree d1, and all other nodes in Hd have degree d.

Proof.

We start from a (d+1)-clique Kd+1, and then remove an arbitrary matching of size (d1)/2. The resulting graph has d1 nodes of degree d1, and 2 nodes of degree d. We then add a new node and connect it with an edge to all the nodes of degree d1. The resulting graph clearly has the claimed properties.

We use Lemma 12 to do what we will henceforth call attaching a degree-blocking gadget: given a graph of odd maximum degree Δ, some value dΔ, and a node v with degree deg(v)<d, we turn v into a degree-d node by adding ddeg(v) copies of HΔ to the graph, and adding an edge between v and degree-(Δ1) node in each copy of HΔ. Clearly then v will have degree d, and each added node will have degree exactly Δ.

We now proceed to the main proof. For simplicity, we start with the case of odd maximum degree Δ.

Theorem 13.

Bounded-degree network design and bounded-degree network design with Steiner nodes are NP-hard for any odd Δ3.

Proof.

We reduce from vertex cover on 3-regular graphs; recall that the problem is known to remain NP-complete even with the degree restriction [21, 20]. More precisely, we will give a reduction that has the additional property that the resulting instance is a yes-instance without Steiner nodes if and only if it is a yes-instance with Steiner nodes, thus proving NP-hardness for both variants of the problem.

Let (V,E,k) be an instance of vertex cover (in its decision form, where we ask if there is a vertex cover of size k). We first define the various gadget graphs we will use in the the construction.

Selector gadget.

Let b=2log2k be the smallest power of two larger than k. To construct the selector gadget, we start with a complete binary tree with b leaves and root node r. We arbitrarily select k leaves as the selector nodes s1,s2,,sk, and attach Δ2 degree-blocking gadgets HΔ to each si. We also attach Δ2 degree-blocking gadgets HΔ to the root r, and Δ1 degree-blocking gadgets to the remaining leaves. One can now verify that each selector node has degree Δ1, and the remaining nodes in the selector gadget have degree Δ.

Vertex gadgets.

For each vertex vV in the vertex cover instance, we construct a vertex gadget as follows – recall that by assumption v has degree 3. We take a complete binary tree with 4 leaves, denoting the root of the tree by rv. We identify 3 of the leaves as terminal nodes te for edges e incident to node v. Finally, we attach Δ3 degree-blocking gadgets HΔ to the root rv, as well as Δ2 degree-blocking gadget to each terminal node and Δ1 degree-blocking gadgets to the remaining leaf.

Finally, we combine the vertex gadgets for all vertices in V by identifying two terminal nodes for edge e={u,v} in the vertex gadgets of u and v, as well as merging the respective degree-blocking gadgets into one. We can now observe that in the graph formed by the combined vertex gadget, the root nodes rv for vV have degree Δ1, and all other nodes have degree Δ.

Instance construction.

We now construct an instance (V,w,K) of bounded-degree network design with Steiner nodes as follows. Let V be the set of nodes in the selector gadget and the combined vertex gadgets as constructed above. For any edge {u,v}V in the gadget constructions, we set the demand w({u,v}) to be W=|E|(log2b+3)+1. For each edge eE in the vertex cover instance, we add demand w({r,te})=1 between the root of the selector gadget and the terminal node for e. For all other pairs, we set the demand to 0. Finally, we set the effective path length threshold for the bounded network design instance to be K=MW+|E|(log2b+3), where M is the total number of edges in the gadgets.

Correctness.

Now assume that (V,E,k) is a yes-instance of vertex cover, and let C={v1,v2,,vk}V be a vertex cover. Let G=(V,E) be a host graph for instance (V,w,K) obtained by taking all the gadget edges and edges {si,rvi} for i=1,2,,k. The demands for the gadget edges are satisfied by G with direct edges, contributing a total of MW to the effective path length. Now consider an arbitrary edge eE and a demand between r and te. Since C is a vertex cover, there is a vertex viCe such that the edge {si,rvi} belongs to E. Thus there is a path from r to te in G that starts from r and travels along the selector gadget to si, crosses the edge {si,rvi} and travels from rvi to te along the vertex gadget for vi. This path has length log2b+3. Since e was selected arbitrarily and C is a vertex cover, this holds for all edges eE. Therefore the total effective path length is MW+|E|(log2b+3)=K, that is, (V,w,K) is a yes-instance.

For the other direction, assume that (V,w,K) is a yes-instance, and let G=(VU,E) be a host graph with effective path length at most K. First, we observe that G must include all gadget edges, as otherwise the effective path length from the corresponding demands is at least (M+1)W>K. Now consider the path between r and te for an arbitrary eE. Since all gadget edges are included in G, this path must exit the selector gadget via an edge connected to one of the selector nodes si, as all other nodes in the selector gadget have degree Δ from the edges inside the gadget. By the same argument, the path must enter the vertex gadget via one the nodes rv and travel via gadget edges to te. It follows that this path must have length at least log2b+3. Thus, for the effective path length to be at most K=MW+|E|(log2b+3), the distance between r and each te must be exactly log2b+3.

We now observe that for an edge e={u,v}E, by the same reasoning as above, the only way for the path from r to te to be of length log2b+3 is that the path travels from r to a selector node si, then from si to either rv or ru by a direct edge, and then via the vertex gadget to te. Thus, for any edge e={u,v}E, either {si,rv} or {si,ru} is in E for some i=1,2,,k. Thus, the set of vertices

C={vV:{si,rv}E for some i=1,2,,k}

is a vertex cover of G, and since each si may only be incident to one non-gadget edge due to the degree constraint, we have |C|k. Thus, (V,E,k) is a yes-instance of vertex cover.

We can now modify the above construction for even maximum degree as follows.

Theorem 14.

Bounded-degree network design and bounded-degree network design with Steiner nodes are NP-hard for any even Δ4.

Proof.

Let Δ4 be fixed and even. We start by taking the reduction given by Theorem 13 for Δ1, and modify it as follows. Let N be the total number of nodes in the instance (V,w,K) produced by the reduction, and let M be the number of forced edges in the gadgets, i.e., the number of edges with demand W.

We now create the instance for degree Δ by taking two disjoint copies of the node set and demands of the degree-(Δ1) instance (V,w,K), and adding a demand W for each pair of corresponding nodes from the two copies. All other demands for pairs from different copies is set to 0. Finally, the effective path threshold is set to 2(MW+N)+2|E|(log2b+3).

If the vertex cover instance was a yes-instance, then the degree-Δ instance has a solution of cost 2(MW+|E|(log2b+3))+NW, obtained by taking the solution for degree-(Δ1) instance for both copies, and adding all the edges between corresponding nodes in the two copies. On the other hand, if the degree-Δ instance is a yes-instance, then all high-weight edges between the two copies must be included in the solution, using up one edge for each node in the instance. Each copy of the degree-(Δ1) instance must have effective path length of MW+|E|(log2b+3) for its internal demands, which by same argument as in the proof of Theorem 13 is only possible if the original vertex cover instance is a yes-instance.

Putting together all the results from this section, we obtain Theorem 4.

Appendix B Additional tables and figures

Table 4: Properties of demand graphs in the datacenter trace collection from Avin et al. [5]. The table summarizes the number of nodes, edges, minimum degree, average degree, maximum degree, entropy and conditional entropy of the demand graphs. For the entropy calculations the base-2 logarithm was used.
Trace n m δ Δavg Δ entropy cond. entropy
fb-cluster-rack-A 13,733 496,624 1 72.33 7,272 16.97 7.98
fb-cluster-rack-B 18,897 1,777,559 1 188.13 11,932 16.23 7.66
fb-cluster-rack-C 27,358 2,326,086 1 170.05 25,224 18 8.91
hpc-cesar-mocfe 1,024 3,808 2 7.44 21 12.81 3.28
hpc-cesar-nekbone 1,024 15,115 16 29.52 36 14.43 4.48
hpc-boxlib-cns 1,024 37,982 55 74.18 1,023 16.19 6.21
hpc-boxlib-multigrid 1,024 10,620 7 20.74 26 14.37 4.43
p-fabric-trace-0-1 148 10,300 1 139.19 144 13.03 5.88
p-fabric-trace-0-5 144 10,296 143 143 143 13.03 5.87
p-fabric-trace-0-8 144 10,296 143 143 143 13.22 6.06
Table 5: The expected path length (EPL) in the resulting host graphs computed by the Steiner Node Insertion algorithm for different maximum degree bounds. We denote by n the number of nodes in the host graph and by n the number of nodes in the demand graph.
Δ=8 Δ=16 Δ=32
Trace n/n EPL n/n EPL n/n EPL
fb-cluster-rack-A 12.5 4.85 5.8 3.31 3.1 2.55
fb-cluster-rack-B 31.7 4.51 14 3.17 6.9 2.45
fb-cluster-rack-C 28.6 5.42 12.4 3.8 6 2.68
hpc-cesar-mocfe 1.5 1.77 1.2 1.18 1 1
hpc-cesar-nekbone 5.2 2.57 2.5 1.67 1.5 1
hpc-boxlib-cns 12.6 3.72 5.7 2.52 3 1.92
hpc-boxlib-multigrid 3.9 2.48 1.9 1.64 1 1
p-fabric-trace-0-1 23.4 3.18 10.7 1.97 4.9 1.33
p-fabric-trace-0-5 24 3.17 11 1.97 5 1.33
p-fabric-trace-0-8 24 3.27 11 2.1 5 1.39