Abstract 1 Introduction 2 Preliminaries and notation 3 Modeling power of CR-𝒇-NDP 4 Structure of feasible CR-𝒇-NDP solutions: a decomposition result 5 Algorithmic implication: LP-relative 𝟐-approximation algorithm 6 Hardness result 7 Non-equivalence of path-relative SNDP and cut-relative SNDP References

Tight Guarantees for Cut-Relative Survivable Network Design via a Decomposition Technique

Nikhil Kumar University of Waterloo, Canada J. J. Nan University of Waterloo, Canada Chaitanya Swamy ORCID University of Waterloo, Canada
Abstract

In the classical survivable-network-design problem (𝖲𝖭𝖣𝖯), we are given an undirected graph G=(V,E), non-negative edge costs, and some k tuples (si,ti,ri), where si,tiV and ri+. The objective is to find a minimum-cost subset HE such that each si-ti pair remains connected even after the failure of any ri1 edges. It is well-known that 𝖲𝖭𝖣𝖯 can be equivalently modeled using a weakly-supermodular cut-requirement function f, where the objective is to find the minimum-cost subset of edges that picks at least f(S) edges across every cut SV.

Recently, motivated by fault-tolerance in graph spanners, Dinitz, Koranteng, and Kortsartz proposed a variant of 𝖲𝖭𝖣𝖯 that enforces a relative level of fault tolerance with respect to G. Even if a feasible 𝖲𝖭𝖣𝖯-solution may not exist due to G lacking the required fault-tolerance, the goal is to find a solution H that is at least as fault-tolerant as G itself. They formalize the latter condition in terms of paths and fault-sets, which gives rise to path-relative 𝖲𝖭𝖣𝖯 (which they call relative 𝖲𝖭𝖣𝖯). Along these lines, we introduce a new model of relative network design, called cut-relative 𝖲𝖭𝖣𝖯 (𝖢𝖱-𝖲𝖭𝖣𝖯), where the goal is to select a minimum-cost subset of edges that satisfies the given (weakly-supermodular) cut-requirement function to the maximum extent possible, i.e., by picking min{f(S),|δG(S)|} edges across every cut SV.

Unlike 𝖲𝖭𝖣𝖯, the cut-relative and path-relative versions of 𝖲𝖭𝖣𝖯 are not equivalent. The resulting cut-requirement function for 𝖢𝖱-𝖲𝖭𝖣𝖯 (as also path-relative 𝖲𝖭𝖣𝖯) is not weakly supermodular, and extreme-point solutions to the natural LP-relaxation need not correspond to a laminar family of tight cut constraints. Consequently, standard techniques cannot be used directly to design approximation algorithms for this problem. We develop a novel decomposition technique to circumvent this difficulty and use it to give a tight 2-approximation algorithm for 𝖢𝖱-𝖲𝖭𝖣𝖯. We also show some new hardness results for these relative-𝖲𝖭𝖣𝖯 problems.

Keywords and phrases:
Approximation algorithms, Network Design, Cut-requirement functions, Weak Supermodularity, Iterative rounding, LP rounding algorithms
Copyright and License:
[Uncaptioned image] © Nikhil Kumar, J. J. Nan, and Chaitanya Swamy; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Approximation algorithms analysis
; Mathematics of computing Discrete optimization
Related Version:
Full Version: https://arxiv.org/abs/2507.04473
Funding:
Supported in part by NSERC grant 327620-09.
Editors:
Anne Benoit, Haim Kaplan, Sebastian Wild, and Grzegorz Herman

1 Introduction

In the classical survivable-network-design problem (𝖲𝖭𝖣𝖯), we are given an undirected graph G=(V,E), non-negative edge costs {ce}eE, and some k source-sink pairs si,tiV with requirements ri+, for i=1,,k. The goal is to find a minimum-cost set HE of edges such that there are at least ri edge-disjoint si-ti paths in H, for all i[k]. We overload notation and use H to denote both the edge-set, and the corresponding subgraph of G.

𝖲𝖭𝖣𝖯 imposes an absolute level of fault-tolerance in a solution subgraph H, by ensuring that for any bounded-size fault-set FE of edges that may fail, the graph HF retains some connectivity properties. More precisely, due to Menger’s theorem, or the max-flow min-cut theorem, the feasibility condition on H can be stated equivalently as follows. For every i[k], and every fault-set FE with |F|<ri:

  1. (S1)

    (Path-version) there is an si-ti path in HF;

  2. (S2)

    (Cut-version) for every si-ti cut SV (i.e., |S{si,ti}|=1), we have δHF(S), where δHF(S):=δ(S)(HF).

Recently, motivated by work on fault-tolerance in graph spanners, Dinitz, Koranteng, and Kortsartz [8], proposed a variant of 𝖲𝖭𝖣𝖯 that aims to impose a relative level of fault-tolerance with respect to the graph G. The idea is that even if the 𝖲𝖭𝖣𝖯 instance in infeasible, because G itself does not possess the required level of fault-tolerance, one should not have to completely abandon the goal of fault-tolerance: it is still meaningful and reasonable to seek a solution that is “as fault-tolerant as G”, and in this sense is fault-tolerant relative to G.

To formalize this, it is useful to consider the definition of 𝖲𝖭𝖣𝖯 in terms of fault-sets. Roughly speaking, we would like to capture that H is a feasible solution if

for every fault-set F (valid for 𝖲𝖭𝖣𝖯),  HF and GF have similar connectivity. (*)

To elaborate, in 𝖲𝖭𝖣𝖯, if there is even one fault-set F under which GF fails to have the required connectivity, i.e., |F|<ri and FδG(S) for some si-ti cut S, then “all bets are off”; we declare that the instance in infeasible. But declaring infeasibility here feels unsatisfactory because we allow one specific “problematic” fault-set F to block us from obtaining any kind of fault-tolerance. In contrast, (*1) aims to provide a per-fault-set guarantee, by asking for a solution H that functions as well as G in terms of connectivity under the failure of any fault-set F (considered for 𝖲𝖭𝖣𝖯). We can formalize “HF and GF have similar connectivity” in two ways, via paths or cuts, and this gives rise to the following two problem definitions.

Definition 1.1.

Let (G=(V,E),{ce}eE,{si,ti,ri}i[k]) be an 𝖲𝖭𝖣𝖯 instance.

  1. (R1)

    Path-relative 𝖲𝖭𝖣𝖯: HE is a feasible solution if for every i[k] and FE with |F|<ri, GF has an si-ti path HF has an si-ti path.

  2. (R2)

    Cut-relative 𝖲𝖭𝖣𝖯 (𝖢𝖱-𝖲𝖭𝖣𝖯): HE is a feasible solution if for every i[k] and FE with |F|<ri, for every si-ti cut S,  δGF(S)δHF(S).

The goal in both problems is to find a minimum-cost feasible solution.

Perhaps surprisingly, path-relative 𝖲𝖭𝖣𝖯 and cut-relative 𝖲𝖭𝖣𝖯 are not equivalent, even when the 𝖲𝖭𝖣𝖯 instance involves a single s-t pair. It is not hard to show that if H is feasible for 𝖢𝖱-𝖲𝖭𝖣𝖯, it is also feasible for path-relative SNDP111Fix any i[k] and FE with |F|<ri. If GF has an si-ti path, then δGF(S) for every si-ti cut. So since H is feasible for cut-relative 𝖲𝖭𝖣𝖯, we have δHF(S) for every si-ti cut, which implies that HF has an si-ti path. but the converse fails to hold; see Section 7 for an example.

Path-relative 𝖲𝖭𝖣𝖯 was defined by Dinitz et al. [8], who referred to this problem simply as relative 𝖲𝖭𝖣𝖯. They considered (among other problems) the path-relative version of k-edge connected subgraph (k-𝖤𝖢𝖲𝖲), which is the special case of 𝖲𝖭𝖣𝖯 where we have an si-ti pair with ri=k for every pair of nodes. (In this case, the path-relative and cut-relative versions do turn out to be equivalent [8].) They called the resulting path-relative problem, k-edge fault-tolerant subgraph (k-𝖤𝖥𝖳𝖲), and observed that the feasibility condition for k-𝖤𝖥𝖳𝖲 can be equivalently stated as: H is feasible iff |δH(S)|g(S):=min{k,|δG(S)|} for all SV. The function g:2V is called a cut-requirement function, as it stipulates the (minimum) number of edges across any cut in any feasible solution. Cut-requirement functions constitute a very versatile framework for specifying network-design problems, where given a cut-requirement function f:2V, the corresponding f-network-design problem (f-𝖭𝖣𝖯), also called the f-connectivity problem, is to find a minimum-cost set HE such that |δH(S)|f(S) for all SV. For instance, it is easy to see that 𝖲𝖭𝖣𝖯 corresponds to f-𝖭𝖣𝖯 for the cut-requirement function f𝖲𝖭𝖣𝖯, defined by f𝖲𝖭𝖣𝖯(S):=max{ri:|S{si,ti}|=1} (and k-𝖤𝖢𝖲𝖲 is fk-𝖤𝖢𝖲𝖲-𝖭𝖣𝖯 where fk-𝖤𝖢𝖲𝖲(S):=k for all SV); various other network-design problems, such as the T-join problem, point-to-point connection problem etc., can be modeled using suitable cut-requirement functions (see, e.g., [10, 11]).

Cut-relative 𝖲𝖭𝖣𝖯 is a problem that we introduce in this paper. Its formulation in terms of cuts is the problem one obtains when we replace fk-𝖤𝖢𝖲𝖲 in the cut-based formulation of k-𝖤𝖥𝖳𝖲 by the cut-requirement function f𝖲𝖭𝖣𝖯 for (general) 𝖲𝖭𝖣𝖯: that is, (similar to k-𝖤𝖥𝖳𝖲), we can say that HE is feasible for 𝖢𝖱-𝖲𝖭𝖣𝖯 iff |δH(S)|g𝖢𝖱-𝖲𝖭𝖣𝖯(S):=min{f𝖲𝖭𝖣𝖯(S),|δG(S)|} for all SV (we show this easy equivalence in Section 2); in other words, 𝖢𝖱-𝖲𝖭𝖣𝖯 corresponds to g𝖢𝖱-𝖲𝖭𝖣𝖯-𝖭𝖣𝖯. To gain some intuition for cut-relative 𝖲𝖭𝖣𝖯, and contrast it with path-relative 𝖲𝖭𝖣𝖯, consider 𝖲𝖭𝖣𝖯 with a single s-t pair and requirement r, for simplicity. A feasible solution H to path-relative 𝖲𝖭𝖣𝖯 offers a per-fault-set guarantee as encapsulated by (R1). But, for a given fault-set F with |F|<r, we get a weak fault-tolerance guarantee in terms of s-t cuts: if δGF(S)= for even one s-t cut S then there is no requirement on H for this fault-set F. Cut-relative 𝖲𝖭𝖣𝖯 offers a per-fault-set and per-cut guarantee, since for (every F with |F|<r and) every s-t cut S, we require that δHF(S) if δGF(S).

Along the lines of 𝖢𝖱-𝖲𝖭𝖣𝖯, we can easily extend the cut-relative model to capture, more broadly, the cut-relative version of any network-design problem specified by a cut-requirement function: given a cut-requirement function f, in the corresponding cut-relative f-network-design problem (𝖢𝖱-f-𝖭𝖣𝖯), we seek a min-cost HE such that |δH(S)|g𝖢𝖱-f-𝖭𝖣𝖯(S):=min{f(S),|δG(S)|} for all SV; that is, we seek to satisfy the cut-requirement function f to the maximum extent possible. We refer to f as the base cut-requirement function, to distinguish it from the cut-requirement function g𝖢𝖱-f-𝖭𝖣𝖯 that defines 𝖢𝖱-f-𝖭𝖣𝖯.

Modeling power.

We arrived at 𝖢𝖱-f-𝖭𝖣𝖯, which can be seen as a fault-tolerant cut-covering problem, as a technically natural extension of k-𝖤𝖥𝖳𝖲. We show below that 𝖢𝖱-f-𝖭𝖣𝖯 offers a surprising amount of modeling power, and, in particular, allows one to capture stronger forms of relative fault-tolerance compared to k-𝖤𝖥𝖳𝖲. In k-𝖤𝖥𝖳𝖲, there is a sharp relative-fault-tolerance threshold at k: if H is feasible, then GF and HF have the same components whenever |F|<k, but there are no guarantees for larger fault-sets. With 𝖢𝖱-f-𝖭𝖣𝖯, one can capture a weaker guarantee also for other fault-sets, which allows for a more graceful degradation of relative fault-tolerance as |F| increases.

Example 1.2.

One way of modeling graceful relative-fault-tolerance degradation is as follows: given a non-increasing function τ:++, we seek a min-cost subgraph H such that for every fault-set F, GF and HF have exactly the same components with at most τ(|F|) nodes. If G models a communication network where connected nodes can communicate with each other, then this yields the desirable guarantee that, post-faults, if a node can communicate with more than τ(|F|) nodes in G then the same holds for H; if this number is at most τ(|F|), then post-faults, it can communicate with the same nodes in G and H. Note that if τ(k1)n=|V|, then H is feasible for k-𝖤𝖥𝖳𝖲; by adding more “levels” to τ, we can obtain fault-tolerance guarantees for larger fault-sets.

In Section 3, we show that this problem can be modeled as 𝖢𝖱-f-𝖭𝖣𝖯 with the weakly-supermodular function f=f𝗀𝗋𝖺𝖼𝖾, where f𝗀𝗋𝖺𝖼𝖾(S):=min{:τ()<|S|}, for S.

Example 1.3.

Generalizing Example 1.2 substantially, suppose along with τ, we have a monotone function π:2V+, i.e., π(T)π(S) if TS. We now seek a subgraph H such that for every fault-set F and SV with π(S)τ(|F|), we have that S is (the node-set of) a component of GF iff it is a component of HF. Similar to Example 1.2, we can model this as 𝖢𝖱-f-𝖭𝖣𝖯 by defining f(S):=min{:τ()<π(S)}, for S (Theorem 3.2).

This setup yields fault-tolerance degradation depending on monotone properties of components other than just their size, which creates a rich space of problems. For example, suppose π(S)=maxu,vSminu-v paths P in G|P| is the weak-diameter of S. Setting τ()=n if <k, and some t<n for larger , we seek a k-𝖤𝖥𝖳𝖲 solution H such that for FE with |F|k, GF and HF have the same components of weak-diameter at most t.

1.1 Our contributions

We introduce cut-relative network-design problems and develop strong approximation guarantees for these problems. We obtain an approximation guarantee of 2 for cut-relative 𝖲𝖭𝖣𝖯, which, notably, matches the best-known approximation factor for 𝖲𝖭𝖣𝖯. Our guarantee applies more generally to 𝖢𝖱-f-𝖭𝖣𝖯, whenever the base cut-requirement function f satisfies certain properties and the natural LP-relaxation of the problem (CRLPf,G) can be solved efficiently. Our guarantee is relative to the optimal value of this LP, and is tight in that it matches the integrality gap of this LP.

We also show that even in the simplest 𝖲𝖭𝖣𝖯 setting with only one s-t pair (wherein 𝖲𝖭𝖣𝖯 is polytime solvable), cut-relative 𝖲𝖭𝖣𝖯 and path-relative 𝖲𝖭𝖣𝖯 capture k-𝖤𝖢𝖲𝖲 as a special case, and are thus APX-hard (Section 6). Previously, even NP-hardness of path-relative 𝖲𝖭𝖣𝖯 in the s-t case (which is studied by [8, 9]) was not known.

Technical contributions and overview.

Technically, our main contribution is to show that we can obtain such a strong guarantee despite the fact that the cut-requirement function defining cut-relative network-design (i.e., g𝖢𝖱-f-𝖭𝖣𝖯) is not weakly supermodular, which is the key property that drives the 2-approximation algorithm for 𝖲𝖭𝖣𝖯. To elaborate, there is a celebrated 2-approximation algorithm for 𝖲𝖭𝖣𝖯 due to Jain [15] based on iterative rounding. This crucially exploits the fact that the underlying cut-requirement function f𝖲𝖭𝖣𝖯 is weakly supermodular: for any two node-sets A,BV, we have:

f𝖲𝖭𝖣𝖯(A)+f𝖲𝖭𝖣𝖯(B)max{f𝖲𝖭𝖣𝖯(AB)+f𝖲𝖭𝖣𝖯(AB),f𝖲𝖭𝖣𝖯(AB)+f𝖲𝖭𝖣𝖯(BA)}.

This property allows one to argue that given an LP-solution x, any two tight sets that cross – i.e., sets A,B for which x(S)=f𝖲𝖭𝖣𝖯(S) holds for S{A,B} and AB,AB,BA are all non-empty – can be “uncrossed”, and thereby an extreme-point solution x^ to the LP can be defined via a laminar family of tight cut constraints. By a laminar family, we mean that any two sets A,B in the family satisfy AB= or AB, and uncrossing two crossing tight sets means that they can be replaced by an equivalent laminar family of tight sets. Jain’s seminal contribution was to show that given such a laminar family defining an extreme point, there always exists an edge e for which x^e12; picking such an edge and iterating then yields the 2-approximation. This technique of uncrossing tight cut-constraints to obtain a laminar family of tight cut-constraints has proved to be quite versatile, becoming a staple technique that has been leveraged to obtain strong guarantees in various network-design settings such as, most notably, network-design problems with degree constraints [13, 17, 19, 5, 4, 16]. More generally, this technique of uncrossing to obtain a structured family of tight constraints has been utilized for various combinatorial-optimization problems; see, e.g., [18].

As mentioned earlier, the main complication with 𝖢𝖱-f-𝖭𝖣𝖯 is that the underlying cut-requirement function g𝖢𝖱-f-𝖭𝖣𝖯 is usually not weakly-supermodular, even if the base cut-requirement function f is. In particular, the cut-requirement function g𝖢𝖱-𝖲𝖭𝖣𝖯 defining cut-relative 𝖲𝖭𝖣𝖯 is not weakly-supermodular. This difficulty was also noted by Dinitz et al. [8] when they considered k-edge fault-tolerant subgraph (k-𝖤𝖥𝖳𝖲, or path- or cut- relative k-𝖤𝖢𝖲𝖲 in our terminology). For this special case, they identify a notion called local weak-supermodularity that is satisfied by the cut-requirement function min{k,|δG(S)} for k-𝖤𝖥𝖳𝖲, and observed that Jain’s machinery can be used as is if this property holds; that is, one can uncross tight sets to obtain a laminar family, and hence obtain a 2-approximation for k-𝖤𝖥𝖳𝖲 proceeding as in Jain’s algorithm for 𝖲𝖭𝖣𝖯.

However, for general 𝖢𝖱-𝖲𝖭𝖣𝖯, such an approach breaks down, because, as we show in Section 2.1, one can construct quite simple 𝖢𝖱-𝖲𝖭𝖣𝖯 instances where an (optimal) extreme point cannot be defined by any laminar family of tight cut constraints. In particular, this implies that the cut-requirement function g𝖢𝖱-f-𝖭𝖣𝖯 is (in general) not locally weakly-supermodular (even when f is weakly-supermodular); moreover, it does not satisfy any property that allows for the uncrossing of tight sets. The upshot here is that the standard technique of uncrossing tight sets to obtain a laminar family does not work, and one needs new ideas to deal with cut-relative network design.

The chief technical novelty of our work is to show how to overcome the impediment posed by the lack of any such nice structural property for g𝖢𝖱-f-𝖭𝖣𝖯, via a novel decomposition technique that allows one to reduce cut-relative f-𝖭𝖣𝖯 with a weakly supermodular base cut-requirement function to (standard) f-𝖭𝖣𝖯 with (different) weakly supermodular cut-requirement functions (see Theorem 4.1).

We introduce a little notation to describe this. Let 𝖢𝖱-(h,D)-𝖭𝖣𝖯 denote 𝖢𝖱-f-𝖭𝖣𝖯 on graph D with base cut-requirement function h. For SV, define its deficiency to be f(S)|δG(S)|; we say that S is a small cut if its deficiency is positive (i.e., |δG(S)|<f(S)). We use G[S] to denote the subgraph induced by S. Let S¯ denote VS.

Assume that the underlying base cut-requirement function f is weakly supermodular (as is the case with 𝖲𝖭𝖣𝖯). Observe first that if there is no small cut then 𝖢𝖱-f-𝖭𝖣𝖯 is the same as f-𝖭𝖣𝖯. Our key technical insight is that, otherwise, we can utilize a novel splitting operation to simplify our problem. We show (see Theorem 4.5) that if we pick a small cut AV with maximum deficiency, then one can define suitable weakly-supermodular functions fA:2A and fA¯:2A¯ such that any solution to the original 𝖢𝖱-f-𝖭𝖣𝖯-instance yields solutions to 𝖢𝖱-(fA,G[A])-𝖭𝖣𝖯 and 𝖢𝖱-(fA¯,G[A¯])-𝖭𝖣𝖯, and vice-versa. The intuition here is as follows. Since A is a small cut, any feasible 𝖢𝖱-f-𝖭𝖣𝖯 solution must include all edges in δG(A). The functions fA and fA¯ are essentially the restrictions of f to A and A¯ respectively, taking this into account. Consequently, moving to 𝖢𝖱-(fA,G[A])-𝖭𝖣𝖯 and 𝖢𝖱-(fA¯,G[A¯])-𝖭𝖣𝖯 does not really impact the constraints for cuts that do not cross A; but we do eliminate the constraints for crossing cuts. This is the simplification that we obtain via the splitting operation, and one needs to argue that this does not hurt feasibility; that is, the constraints for such cuts are still satisfied when we take δG(A) along with the 𝖢𝖱-(fA,G[A])-𝖭𝖣𝖯 and 𝖢𝖱-(fA¯,G[A¯])-𝖭𝖣𝖯 solutions. Here we exploit the weak-supermodularity of f, which implies that the deficiency function def(S):=f(S)|δG(S)| is also weakly supermodular. One can use this, and the fact that A has maximum deficiency, to bound the deficiency of any crossing set T in terms of the deficiency of non-crossing sets, and hence show that the cut-constraint for T is satisfied.

By recursively applying the above splitting operation to A and A¯, we end up with a partition V1,,Vk of V and weakly-supermodular functions fi:2Vi for all i[k] such that, for each i[k], the graph G[Vi] contains no small cut with respect to fi. It follows that solving fi-𝖭𝖣𝖯 on the graph G[Vi] for all i[k] yields a solution to the original 𝖢𝖱-f-𝖭𝖣𝖯 instance (Theorem 4.1).

While we can obtain this decomposition efficiently, assuming that one has suitable algorithmic primitives involving the base cut-requirement function f (shown in the full version), in fact we only need this decomposition in the analysis: in order to obtain the stated LP-relative 2-approximation algorithm, we only need to be able to find an extreme-point optimal solution to the natural LP-relaxation (CRLPf,G) for 𝖢𝖱-f-𝖭𝖣𝖯 (also after fixing some variables to 1). This is because the translation between 𝖢𝖱-f-𝖭𝖣𝖯-solutions for G, and fi-𝖭𝖣𝖯-solutions on G[Vi] for all i[k], also applies to fractional solutions, and implies that any extreme-point solution to (CRLPf,G) yields extreme-point solutions to the LP-relaxations of fi-𝖭𝖣𝖯 on G[Vi] for all i[k] (parts (b) and (c) of Theorem 4.1); hence, by Jain’s result, we can always find some fractional edge of value at least 12, round its value to 1, and iterate. For 𝖲𝖭𝖣𝖯, we can find an extreme-point optimal solution efficiently because we argue that one can devise an efficient separation oracle for (CRLPf,G) (Lemma 2.3). This yields a 2-approximation algorithm for 𝖢𝖱-𝖲𝖭𝖣𝖯, and more generally 𝖢𝖱-f-𝖭𝖣𝖯, whenever f is weakly supermodular and (CRLPf,G) can be solved efficiently (see Algorithm CRNDP-Alg in Section 5).

Other related work.

Network design is a fairly broad research topic, with a vast amount of literature. We limit ourselves to the work that is most closely connected to our work.

As mentioned earlier, path-relative 𝖲𝖭𝖣𝖯 was introduced by Dinitz et al. [8]. In addition to k-𝖤𝖥𝖳𝖲, which is the path-relative version of k-𝖤𝖢𝖲𝖲, they study the path-relative versions of two other special cases of 𝖲𝖭𝖣𝖯, for which they developed constant-factor approximation algorithms: (1) 𝖲𝖭𝖣𝖯 with ri2 for all i; (2) one si-ti pair with ri3. Both results were subsequently extended by [9] who gave a 2-approximation for 𝖲𝖭𝖣𝖯 with ri3 for all i, and a 2O(k2)-approximation when there is one si-ti pair with ri=k. The only result known for general path-relative 𝖲𝖭𝖣𝖯 is due to [7], who (among other results) devise an O(k2log2nloglogn)-approximation algorithm with nO(k) running time. As noted earlier, on the hardness side, prior to our work, it was not known if the setting with one si-ti pair is even NP-hard.

An influential paper by Goemans and Williamson [10] (see also the survey [11]), which built upon the work of [1] for the Steiner forest problem, developed the primal-dual method for network-design problems. Their work also popularized the use of cut-requirement functions to specify network-design problems, by showing how this framework can be used to capture a slew of problems, and how their primal-dual framework leads to a 2-approximation algorithm for {0,1}-cut-requirement functions satisfying some properties. This work was extended to handle general integer-valued cut-requirement functions, which captures 𝖲𝖭𝖣𝖯, in [20, 12], which led to an O(logmaxiri)-approximation for 𝖲𝖭𝖣𝖯. The seminal work of Jain [15] later improved this to a 2-approximation, and in doing so, introduced the powerful technique of iterative rounding. Later work of [17, 19] on degree-bounded network design added another ingredient to iterative rounding, namely iteratively dropping some constraints. This paradigm of iterative rounding and relaxation has proved to be an extremely versatile and powerful tool in developing algorithms (and structural results) for network-design problems, and more generally in combinatorial optimization; see [18] for an extensive study.

Iterative rounding and relaxation derives its power from the fact that an extreme-point solution to an LP-relaxation of the problem can be defined using a structured family of tight constraints, such as, often a laminar family of cut constraints in the case of network-design problems. As noted earlier, this key property does not hold for cut-relative 𝖲𝖭𝖣𝖯 (and path-relative 𝖲𝖭𝖣𝖯). Recently, various works have considered network-design problems that give rise to cut constraints that are less structured and not quite uncrossable; see [2, 3, 6] and the references therein. Our work can be seen as furthering this research direction.

2 Preliminaries and notation

Recall that we are given an undirected graph G=(V,E) with nonnegative edge costs {ce}eE. For a subset SV and subset ZE, which we will interchangeably view as the subgraph (V,Z) of G, we use δZ(S) to denote δG(S)Z, i.e., the edges of Z on the boundary of S. Recall that S¯ denotes VS, and G[S] denotes the subgraph induced by S. A cut-requirement function on G is a function f:2V. (We allow f(S) to be negative chiefly for notational simplicity; this does not affect anything, as we will only examine sets for which f(S)0.) Recall the following network-design problems.

  • f-network-design problem (f-𝖭𝖣𝖯): find a min-cost edge-set H such that |δH(S)|f(S) for all SV.

  • Cut-relative network-design problem (𝖢𝖱-f-𝖭𝖣𝖯): find a min-cost edge-set H such that |δH(S)|g𝖢𝖱-f-𝖭𝖣𝖯(S):=min{f(S),|δG(S)|} for all SV. This corresponds to g𝖢𝖱-f-𝖭𝖣𝖯-𝖭𝖣𝖯. We call f the base cut-requirement function.

  • Survivable network design problem (𝖲𝖭𝖣𝖯) is a special case of f-𝖭𝖣𝖯. The input also specifies k tuples {(si,ti,ri)}i[k], where si,tiV and ri+ for all i[k]. Defining f𝖲𝖭𝖣𝖯(S):=max{ri:|S{si,ti}|=1} for all SV, we obtain that 𝖲𝖭𝖣𝖯 is the f𝖲𝖭𝖣𝖯-network-design problem.

  • Cut-relative 𝖲𝖭𝖣𝖯 (𝖢𝖱-𝖲𝖭𝖣𝖯): The input here is the same as in 𝖲𝖭𝖣𝖯. In Definition 1.1 (R2), 𝖢𝖱-𝖲𝖭𝖣𝖯 was defined as: find a min-cost HE such that for every i[k], every FE with |F|<ri, and every si-ti cut S, we have δHF(S) whenever δGF(S). Later in Section 1, we stated that this can be equivalently formulated as 𝖢𝖱-f-𝖭𝖣𝖯 with base cut-requirement function f𝖲𝖭𝖣𝖯. We now justify this statement.

    Suppose that H is feasible under (R2) but |δH(S)|<min{f𝖲𝖭𝖣𝖯(S),|δG(S)|} for some SV. Suppose f𝖲𝖭𝖣𝖯(S)=ri. Then taking F=δH(S), we have |F|<ri, δGF(S), but δHF(S)=, yielding a contradiction. So H is feasible for 𝖢𝖱-f𝖲𝖭𝖣𝖯-𝖭𝖣𝖯. Conversely, suppose H is feasible for 𝖢𝖱-f𝖲𝖭𝖣𝖯-𝖭𝖣𝖯. Consider any i[k], any FE with |F|<ri, and any si-ti cut S with δGF(S). Then, |δF(S)|<min{ri,|δG(S)|}min{f(S),|δG(S)|}|δH(S)|; so δHF(S), showing that H satisfies (R2).

We will consider network-design problems defined on various graphs and with various cut-requirement functions. Given a graph D=(VD,ED) and cut-requirement function h:2VD, we use (h,D)-𝖭𝖣𝖯 to denote f-𝖭𝖣𝖯 on the graph D with cut-requirement function h, and 𝖢𝖱-(h,D)-𝖭𝖣𝖯 to denote 𝖢𝖱-f-𝖭𝖣𝖯 on the graph D with base cut-requirement function h.

Properties of cut-requirement functions.

Let f:2V. We say that f is weakly supermodular if for any two node-sets A,BV, we have f(A)+f(B)max{f(AB)+f(AB),f(AB)+f(BA)}. We say that f is symmetric if f(S)=f(VS) for all SV, and is normalized if f()=f(V)=0.

Since we are working on undirected graphs, we can always replace any cut-requirement function f by its symmetric, normalized version f𝗌𝗒𝗆, where f𝗌𝗒𝗆(S):=max{f(S),f(VS)} for all SV and f𝗌𝗒𝗆()=f𝗌𝗒𝗆(V):=0, without changing the resulting network-design problem(s), i.e., we have f-𝖭𝖣𝖯f𝗌𝗒𝗆-𝖭𝖣𝖯 and 𝖢𝖱-f-𝖭𝖣𝖯𝖢𝖱-f𝗌𝗒𝗆-𝖭𝖣𝖯.

Lemma 2.1 shows that weak-supermodularity is preserved under various operations. This will be quite useful in the analysis of our decomposition technique. Part a of the lemma shows that weak supermodularity is preserved under symmetrization and normalization, so for any f-𝖭𝖣𝖯 or 𝖢𝖱-f-𝖭𝖣𝖯 instance involving a weakly-supermodular base cut-requirement function f, we may assume that f is symmetric and normalized.

All omitted proofs and details can be found in the full version of the paper.

Lemma 2.1.

Let f:2V be weakly supermodular. Then

  1. (a)

    f𝗌𝗒𝗆 is weakly supermodular.

  2. (b)

    Let w+E. Define g1(S):=f(S)w(δG(S)) for all SV. Then g1 is weakly supermodular, and g1 is symmetric if f is symmetric. In particular, for any ZE, the function f(S)|δZ(S)| is weakly supermodular, and is symmetric if f is symmetric.

  3. (c)

    Let XV, and 𝒞 be a collection of subsets of VX closed under taking set intersections, unions, differences, and complements with respect to VX, i.e., if S𝒞 then VXS𝒞, and S,T𝒞 implies that {ST,ST,ST,TS}𝒞.

    Define the projection of f onto X with respect to 𝒞 as the function g2:2X given by g2()=g2(X):=0, and g2(S):=maxT𝒞f(ST) for all SX. If f is symmetric, then g2 is weakly supermodular and symmetric.

Proof.

Part (a) follows from a simple case analysis; part (b) follows because w(δG(S)) is symmetric, submodular. We focus on proving part (c). Essentially, the closure properties of 𝒞 enable us to transfer the weak-supermodularity of f to the function g2.

We first argue that g2 is symmetric. If A{,X}, we have g2(A)=g2(XA) by definition. Otherwise, if g2(A)=f(ATA), we have f(ATA)=f(V(ATA))=f((XA)(VXTA))g2(XA) where the last inequality follows since VXTA𝒞. We also have g2(XA)g2(A) by the same type of reasoning, and so g2(A)=g2(XA) for all AX.

Now we show that g2 is weakly supermodular. Consider A,BX. If any of the sets AB,BA,AB,X(AB) are empty, then g2(A)+g2(B)=g2(AB)+g2(AB) or g2(A)+g2(B)=g2(AB)+g2(BA). The former holds when AB or BA is empty; the latter holds when AB or X(AB) is empty, where we also utilize the fact that g2 is symmetric. So assume otherwise. Then, for every S{A,B,AB,AB,AB,BA}, we have g2(S)=maxT𝒞f(ST).

Let g2(A)=f(ATA) and g2(B)=f(BTB), where TA,TB𝒞. Let A=ATA and B=BTB. For any S{AB,AB,AB,BA}, we can write S=(SX)T, where T𝒞 due to the closure properties of 𝒞. It follows that g2(SX)f(S) for all S{AB,AB,AB,BA}. So if f(A)+f(B)f(AB)+f(AB), we obtain that g2(A)+g2(B)g2(AB)+g2(AB), and if f(A)+f(B)f(AB)+f(BA), we obtain that g2(A)+g@(B)g2(AB)+g2(BA).

The intuition behind the projection operation is as follows. Suppose f is a cut-requirement function and we know that no edges are picked from EG(VX)δG(X). Then, roughly speaking, g2(S) captures the constraints that arise on SX due to f and 𝒞.

2.1 LP-relaxation for CR-𝒇-NDP

We consider the following natural LP-relaxation for 𝖢𝖱-f-𝖭𝖣𝖯. From now on, we assume that the cut-requirement function f:2V is weakly supermodular, symmetric, and normalized. Given αE and FE, let α(F) denote eFαe.

min eEcexe (CRLPf,G)
s.t. x(δG(S)) min{f(S),|δG(S)|} SV (1)
0xe 1 eE. (2)

The LP-relaxation for f-𝖭𝖣𝖯 is similar, with the cut-constraints taking the simpler form x(δG(S))f(S) for all SV. We denote this LP by (NDPf,G). Our algorithm is based on iterative rounding, where we iteratively fix some xe variables to 1. Suppose that we have fixed xe=1 for all eZ1. Then, in that iteration, we are considering the residual problem on the subgraph G=(V,E=EZ1), which leads to the following variant of (CRLPf,G):

min eEcexe (P’)
s.t. x(δG(S)) min{f(S),|δG(S)|}|δZ1(S)| SV (3)
0xe 1 eE.

Defining f(S)=f(S)|δZ1(S)| for all SV, we can rephrase constraints (3) as x(δG(S))min{f(S),|δG(S)|} for all SV. Since f is weakly supermodular, symmetric (Lemma 2.1 (b)), and normalized, (P’) is of the same form as (CRLPf,G): we have (P’) (CRLPf,G). This will be convenient for iterative rounding, as the residual problem is of the same form as the original problem. (CRLPf,G) and (P’) involve an exponential number of constraints, but using the ellipsoid method, we can find an extreme-point optimal solution provided we have a separation oracle for them. Recall that a separation oracle is a procedure that given a candidate point determines if it is feasible, or returns a violated inequality. Observe that a separation oracle for (CRLPf,G) also yields a separation oracle for (P’), since (P’) is simply (CRLPf,G) after fixing some variables to 1.

Fact 2.2 (Ellipsoid method [14]).

Given a polytime separation oracle for (CRLPf,G), one can find an extreme-point optimal solution to LPs (CRLPf,G) and (P’) in polytime.

For 𝖢𝖱-𝖲𝖭𝖣𝖯, i.e., when f=f𝖲𝖭𝖣𝖯, a polytime separation oracle for (CRLPf,G) can be obtained using min-cut computations. This was shown by [8] for path-relative k-𝖤𝖢𝖲𝖲, which is equivalent to cut-relative k-𝖤𝖢𝖲𝖲; refining their ideas yields a separation oracle for (CRLPf,G) for general 𝖲𝖭𝖣𝖯.

Lemma 2.3.

When f=f𝖲𝖭𝖣𝖯, there is a polytime separation oracle for (CRLPf,G). Hence, one can obtain extreme-point optimal solutions to (CRLPf,G) and (P’) in polytime.

Proof.

The second statement follows from Fact 2.2. Let (si,ti,ri)i[k] be the k tuples defining the 𝖲𝖭𝖣𝖯 instance, which recall leads to the cut-requirement function f𝖲𝖭𝖣𝖯(S):=max{ri:|S{si,ti}|=1} for all SV. Say that SV is a small cut if f𝖲𝖭𝖣𝖯(S)>|δG(S)|, and it is a small cut for i if |S{si,ti}|=1 and ri>|δG(S)|. Note that if eδG(S) for any small cut S, then we must have xe=1 in any feasible solution.

Now we can equivalently phrase the constraints of (CRLPf,G) as follows: for any edge a=uvE, we must have xa=1 or, for every i[k], the minimum si-ti cut also separating u and v under the {xe}eE-capacities should have capacity at least ri. So to detect if x is a feasible solution, we simply need to consider every edge a=uv with xa<1 and every i[k], and find the minimum si-ti cut also separating u and v under the {xe}eE capacities. If an si-ti cut separates u,v, then u lies on the si-side and v lies on the ti-side, or the other way around. So to find the minimum si-ti cut also separating u and v, we find the minimum {si,u}-{ti,v} cut – by which we mean the minimum si-ti cut where si,u are on the same side, and ti,v are on the other side–and the minimum {si,v}-{ti,u}-cut and take the one with smaller capacity.

Extreme-point solution to (CRLPf,G) not defined by a laminar family

We show that for the 𝖢𝖱-𝖲𝖭𝖣𝖯 instance shown in Fig. 1, the extreme-point solution x^ shown in the figure, cannot be expressed as the solution to any laminar family of tight cut constraints (1) (along with tight edge constraints (2)). The 𝖲𝖭𝖣𝖯 instance is s-t 2-edge connectivity: that is, the base cut-requirement function is given by f(S)=2 if S is an s-t cut, and f(S)=0 otherwise.

Refer to caption
Figure 1: 𝖢𝖱-𝖲𝖭𝖣𝖯 instance, and an extreme-point solution x^ to (CRLPf,G). The solid edges have x^e=1 and the dashed edges have x^e=0.5, so x^e=0.5 for e{su,uw,sv,vw} and x^e=1 for e{sw,wt}.

Note that the only small cut above containing s is S={s,u,v,w}. One can verify by inspection that x^ is feasible. It is not hard to see that x^ is the unique solution to the following set of equations, which come from constraints that are tight at x^.

x(δ(S)) =2S{{s},{s,u,v},{s,u,w},{s,v,w}}, (4)
xe =1e{sw,wt}. (5)

This shows that x^ is an extreme-point solution to (CRLPf,G). With edge costs csw=0 and ce=1 for all other edges, x^ is also an optimal solution. The constraints x(δ(S))2 for all S{{s},{s,u,v},{s,u,w},{s,v,w}} imply that (since xe1 for all e)

xsu+xsv1,x(δ(u))1,x(δ(v))1,xuw+xvw1.

Adding these constraints, we obtain that xsu+xsv+xuv+xvw2. Therefore, the cost of any feasible solution is at least 3, and we have cTx^=3.

𝒙^ cannot be defined via a laminar family.

We now argue that x^ cannot be defined by any laminar family of tight cut constraints and tight edge constraints. Note that any tight cut constraint corresponds to an s-t cut. So a laminar family of tight cut constraints consists of a union of two chains 12, where a chain is a nested collection of sets: 1 comprising sets containing s but not t, and 2 comprising sets containing t but not s. Then =1{VS:S2} is also a laminar family, yielding the same cut-constraints as , and and all sets in contain s but not t. So we only need to consider laminar families of tight cut constraints corresponding to a chain of sets containing s and not t.

A simple argument now rules out the existence of any such chain that can uniquely define x^ along with the tight edge constraints (5). Any such chain of sets 𝒞 is obtained by ordering the elements u,v,w, and taking sets of the form {s}T, where T is some prefix (including the empty prefix) of this ordered sequence; so 𝒞 contains at most 4 sets. Since x^ has 4 fractional edges, E={su,sv,uw,vw}, it must be that {χδE(S)}S𝒞 contains 4 linearly independent vectors. So 𝒞 contains exactly 4 sets, and in particular the set {s,u,v,w}, and all vectors in {χδE(S)}S𝒞 are linearly independent. This yields a contradiction, since χδE({s,u,v,w})=0.

3 Modeling power of CR-𝒇-NDP

We prove that the 𝖢𝖱-f-𝖭𝖣𝖯 Examples 1.2 and 1.3 listed under “Modeling power” in Section 1 model the stated problems. Recall that in both examples, we have a non-increasing function τ:++.

Theorem 3.1.

Consider the base cut-requirement function f𝗀𝗋𝖺𝖼𝖾 in Example 1.2, where f𝗀𝗋𝖺𝖼𝖾(S):=min{:τ()<|S|}, for S.

  1. (a)

    The function f𝗀𝗋𝖺𝖼𝖾 is weakly-supermodular.

  2. (b)

    H is feasible for 𝖢𝖱-f𝗀𝗋𝖺𝖼𝖾-𝖭𝖣𝖯 iff for every fault-set FE, and every SV with |S|τ(|F|), S is (the node-set of) a component of GF iff it is a component of HF.

Proof.

The function f𝗀𝗋𝖺𝖼𝖾 is downwards-monotone: if TS, then f𝗀𝗋𝖺𝖼𝖾(T)f𝗀𝗋𝖺𝖼𝖾(S). This follows from the definition, since τ is a non-increasing function. Weak-supermodularity of f𝗀𝗋𝖺𝖼𝖾 is now immediate since we have f𝗀𝗋𝖺𝖼𝖾(A)+f𝗀𝗋𝖺𝖼𝖾(B)f𝗀𝗋𝖺𝖼𝖾(AB)+f𝗀𝗋𝖺𝖼𝖾(BA), if AB,BA, and otherwise f𝗀𝗋𝖺𝖼𝖾(A)+f𝗀𝗋𝖺𝖼𝖾(B)=f𝗀𝗋𝖺𝖼𝖾(AB)+f𝗀𝗋𝖺𝖼𝖾(AB).

Note that f𝗀𝗋𝖺𝖼𝖾 is not symmetric or normalized, but as indicated by Lemma 2.1, we can consider 𝖢𝖱-f-𝖭𝖣𝖯 with the symmetric, normalized version of f𝗀𝗋𝖺𝖼𝖾 as the base cut-requirement function, without changing the problem.

To prove the feasibility characterization in part (b), we note that the function f𝗀𝗋𝖺𝖼𝖾 is constructed so that for any SV and FE, we have |S|τ(|F|) iff f𝗀𝗋𝖺𝖼𝖾(S)>|F|, so that |δH(S)|f𝗀𝗋𝖺𝖼𝖾(S) implies that S is not a component of HF. Suppose H is such that |δH(S)|min{f𝗀𝗋𝖺𝖼𝖾(S),|δG(S)|} for all SV. Consider any fault-set FE and any SV such that |S|τ(|F|). By the above, if S is a component of HF, then |δH(S)|<f𝗀𝗋𝖺𝖼𝖾(S), and so S must also be a component of GF. But this also implies that if S is a component of GF, then it is a component of HF; otherwise, there is some AS that is a component of HF with |A|<|S|τ(|F|), and so A must be a component of GF, which is not the case.

Conversely, suppose that for every FE, and SV with |S|τ(|F|), we have that S is a component of GF iff it is a component of HF. If |δH(S)|<min{f𝗀𝗋𝖺𝖼𝖾(S),|δG(S)|} for some SV, then take F=δH(S). Since f𝗀𝗋𝖺𝖼𝖾(S)>|F|, we have |S|τ(|F|). But S is a component of HF and not GF, which yields a contradiction.

Theorem 3.2.

Let π:2V+ be a monotone function, i.e., π(T)π(S) if TS, as in Example 1.3. Consider 𝖢𝖱-f-𝖭𝖣𝖯, where the base cut-requirement function f is given by f(S):=min{:τ()<π(S)}, for all S. Then

  1. (a)

    f is weakly-supermodular;

  2. (b)

    H is feasible for 𝖢𝖱-f-𝖭𝖣𝖯 iff for every fault-set FE, and every SV with π(S)τ(|F|), S is (the node-set of) a component of GF iff it is a component of HF.

Proof.

We mimic the proof of Theorem 3.1. Since π is monotone, we obtain that f is downwards-monotone, and hence weakly-supermodular.

For part (b), similar to before, we have that π(S)τ(|F|) iff f(S)>|F|. Suppose H is feasible for 𝖢𝖱-f-𝖭𝖣𝖯. Consider any fault-set FE and any SV be such that π(S)τ(|F|). By the above, f(S)>|F|, so if S is a component of HF, then it must also be a component of GF. Again, this also implies that if S is a component of GF, then it is a component of HF: otherwise, there is some AS that is a component of HF, and π(A)π(S)τ(|F|), which means that A is a component of GF.

Conversely, suppose that for every FE, and SV with π(S)τ(|F|), we have that S is a component of GF iff it is a component of HF. If |δH(S)|<min{f(S),|δG(S)|} for some SV, then take F=δH(S). Since f(S)>|F|, we have π(S)τ(|F|). But S is a component of HF and not GF, which yields a contradiction.

Our intent with Examples 1.2 and 1.3 is to illustrate that 𝖢𝖱-f-𝖭𝖣𝖯 can be used to model some interesting problems. The choice of the τ and/or π functions can of course impact our ability to solve the LP-relaxation (CRLPf,G) efficiently.

4 Structure of feasible CR-𝒇-NDP solutions: a decomposition result

We now prove our decomposition result, showing that 𝖢𝖱-f-𝖭𝖣𝖯 can be reduced to f-𝖭𝖣𝖯 with suitably-defined weakly-supermodular cut-requirement functions. Recall that the base cut-requirement function f is weakly supermodular (and symmetric, normalized), but the cut-requirement function g𝖢𝖱-f-𝖭𝖣𝖯 underlying 𝖢𝖱-f-𝖭𝖣𝖯 need not be. Given xE and SV, we use xS to denote the restriction of x to edges in S, i.e., the vector (xe)eE(S)E(S).

Theorem 4.1 (Decomposition result).

There is a partition V1,V2,,Vk of V and weakly-supermodular, symmetric, and normalized functions fi:2Vi such that the following hold.

  1. (a)

    FE is a feasible solution to 𝖢𝖱-(f,G)-𝖭𝖣𝖯 iff FδG(Vi) and F(Vi) is a feasible solution to (fi,G[Vi])-𝖭𝖣𝖯 for all i[k].

  2. (b)

    xE is feasible to (CRLPf,G) iff for all i[k], we have xe=1 for all eδG(Vi), and xVi is feasible to (NDPfi,G[Vi]).

  3. (c)

    x is an extreme-point solution to (CRLPf,G) iff for all i[k], we have xe=1 for all eδG(Vi), and xVi is an extreme-point solution to (NDPfi,G[Vi]).

Before delving into the proof of Theorem 4.1, we state the following immediate corollary of Theorem 4.1 (c), which directly leads to a 2-approximation algorithm for 𝖢𝖱-f-𝖭𝖣𝖯 whenever (CRLPf,G) can be solved efficiently.

Corollary 4.2.

Let x^ be an extreme-point solution to (CRLPf,G). There exists some eE for which x^e1/2.

Proof.

By Theorem 4.1 (c), there is a partition of V and f-𝖭𝖣𝖯-instances defined on each part such that x^ induces an extreme-point solution in each f-𝖭𝖣𝖯-instance. By Jain’s result, this implies that in each of these instances, there is some edge e with x^e1/2.

The rest of this section is devoted to the proof of Theorem 4.1. For a set SV, define its deficiency def(S):=f(S)|δG(S)|. We use deff,G(S) (or deff,E(S)) when we want to make the cut-requirement function and graph (or edge-set) explicit. By Lemma 2.1 (b), def(S) is weakly supermodular; also, it is symmetric (and normalized). We say that S is a small cut (or more explicitly a small-(f,G)-cut) if def(S)>0. Clearly, if there is no small cut, then 𝖢𝖱-f-𝖭𝖣𝖯 becomes equivalent to f-𝖭𝖣𝖯. Our chief insight and key structural result is that if there is a small cut, then we can simplify the 𝖢𝖱-f-𝖭𝖣𝖯 instance and move to smaller 𝖢𝖱-f-𝖭𝖣𝖯 instances, by “splitting” the instance along a suitable small cut (Theorem 4.5). By repeating this operation, we eventually obtain an instance with no small cuts, which leads to Theorem 4.1. The splitting operation relies on the following modification of f.

Definition 4.3.

Let SV. Recall that S¯:=VS. Let Z=δG(S). Define the function fS:2S, which we call the restriction of f to S, as follows.

fS(T)={0;if T= or T=Smax{f(T)|δZ(T)|,f(TS¯)|δZ(TS¯)|}otherwiseTS.

The intuition here is that for TS, fS(T) is a lower bound on the residual requirement that needs to be met from δG[S](T) given that we pick all edges of Z. Note that since f and |δZ(.)| are symmetric, f(TS¯)|δZ(TS¯)|=f(ST)|δZ(ST)|, and so fS is the symmetric, normalized version of of the residual requirement function f|δZ()|.

In the splitting operation, we pick a small cut A of maximum deficiency, and move to 𝖢𝖱-f-𝖭𝖣𝖯 instances on the smaller graphs G[A], and G[A¯] obtained by restricting f to A, and restricting f to A¯ respectively (Theorem 4.5). Lemma 4.4 states some basic properties of the restriction of f. Part (b) will be quite useful in proving that the splitting operation maintains feasibility, and part (a) allows us to repeat the splitting operation on the smaller instances. For a set SV, and set FE of edges, we use F(S) to denote the edges of F with both ends in S.

Lemma 4.4.

Let SV. Let fS be the restriction of f to S. Let δG(S)FE.

  1. (a)

    fS is weakly supermodular, symmetric, and normalized.

  2. (b)

    Let TS. Then, deffS,F(S)(T)=max{deff,F(T),deff,F(TS¯)}.

Proof.

Let Z=δG(S). Define f:2V by f(T):=f(T)|δZ(T)|. Then, f is weakly supermodular and symmetric (Lemma 2.1 (b)).

For part (a), we can proceed in two ways. As noted earlier, fS is the symmetric, normalized version f, so part (a) follows from Lemma 2.1 (a). Alternatively, observe that fS is the projection of f onto S with respect to 𝒞:={,S¯}, which is closed under set intersections, unions, differences, and complements with respect to VS. So by Lemma 2.1 (c), we obtain that fS is weakly supermodular and symmetric. Also, fS is normalized by definition.

For part (b), the stated equality follows by simply plugging in fS, and noting that for Y{T,TS¯}, we have |δF(Y)|=|δF(S)(T)|+|δZ(Y)|.

Theorem 4.5 (Splitting along a small cut).

Suppose that there is some small cut. Let AV be a maximum-deficiency cut. Note that def(A)>0 and AV.

  1. (a)

    FE is a feasible solution to 𝖢𝖱-(f,G)-𝖭𝖣𝖯 iff FδG(A), F(A) is a feasible solution to 𝖢𝖱-(fA,G[A])-𝖭𝖣𝖯, and F(A¯) is a feasible solution to 𝖢𝖱-(fA¯,G[A¯])-𝖭𝖣𝖯.

  2. (b)

    x+E is feasible to (CRLPf,G) iff xe=1 for all eδG(A), xA is feasible to (CRLPfA,G[A]), and xA¯ is feasible to (CRLPfA¯,G[A¯]).

Proof.

Part (a) can be seen as the special case of part (b), where x is integral. We prove part (a) here, as the proof is somewhat (notational) simpler. For notational simplicity, let (f1,G1,F1)=(fA,G[A],F(A)) and (f2,G2,F2)=(fA¯,G[A¯],F(A¯)). Let Z=δG(A).

The “only if” direction follows easily from the definition of the restriction of f. Let F be feasible to 𝖢𝖱-(f,G)-𝖭𝖣𝖯. Since A is a small cut, we must have FZ. Consider any TA. Since F is feasible, we have |δF(T)|min{f(T),|δG(T)|}, which implies that |δF1(T)|min{f(T)|δZ(T)|,|δG1(T)|}. Similarly, we have |δF(TA¯)|min{f(TA¯),|δG(TA¯)|}, so |δF1(T)|min{f(TA¯)|δZ(TA¯)|,|δG1(T)|}. Combining the inequalities, and using the definition of restriction, we obtain that |δF1(T)|min{f1(T),|δG1(T)|}. Since T was arbitrary, this shows that F1 is feasible to 𝖢𝖱-(f1,G1)-𝖭𝖣𝖯.

A symmetric argument shows that F2 is a feasible solution to 𝖢𝖱-(f2,G2)-𝖭𝖣𝖯.

Conversely, suppose that FδG(A), F1=F(A) is a feasible solution to 𝖢𝖱-(f1,G1)-𝖭𝖣𝖯, and F2=F(A¯) is a feasible solution to 𝖢𝖱-(f2,G2)-𝖭𝖣𝖯. Recall that Z=δG(A). Consider any TV. Lemma 4.4 (b) can be used to readily argue that if TA or TA¯, then the constraint for set T in 𝖢𝖱-(f,G)-𝖭𝖣𝖯 is satisfied. We show this for TA; a symmetric argument applies for TA¯. If T is a small-(f1,G1)-cut, then F1δG1(T). Since FZ, this implies that FδG(T). Otherwise, we have deff1,F1(T)0, so by Lemma 4.4 (b), we have that deff,F(T)deff1,F1(T)0. Thus, we always have |δF(T)|min{f(T),|δG(T)|}.

Now consider T such that TA,TA¯. We exploit the weak supermodularity of deff,F, and that A has maximum deficiency, to bound deff,F(T) in terms of the deficiency of sets that do not cross A, and thus show that the constraint for T is satisfied. We have
deff,F(T)+deff,F(A)deff,F(TA)+deff,F(TA)=deff,F(TA)+deff,F(A¯T)ordeff,F(T)+deff,F(A)deff,F(AT)+deff,F(TA)

where in the first inequality we also use the fact that deff,F is symmetric. In both cases, we have deff,F(T)+deff,F(A)deff,F(X)+deff,F(Y) where XA, YA¯ and δG(T)δG(X)δG(Y)Z. As shown previously, for S{X,Y}, we have |δF(S)|min{f(S),|δG(S)|}, or equivalently, deff,F(S)max{0,deff,G(S)}. Note that deff,F(A)=deff,G(A)>0 since FδG(A). Since A is a maximum-deficiency small cut, this also implies that deff,F(A)deff,F(S) for S{X,Y}: we have deff,F(S)max{0,deff,G(S)}max{0,deff,G(A)}=deff,F(A).

If both X and Y are small-(f,G)-cuts, then we are done since then we have that FδG(X)δG(Y)ZδG(T). Otherwise, since deff,F(A)max{deff,F(X),deff,F(Y)}, we have deff,F(T)min{deff,F(X),deff,F(Y)}0, since at least one of X,Y is not a small-(f,G)-cut.

Proof of Theorem 4.1.

Parts (a) and (b) follow easily by induction on the number of nodes, using parts (a) and (b) of Theorem 4.5. Consider part (a). The base case is when there is no small-(f,G)-cut, in which case, we have V1=V, and f1=f. Otherwise, let A=argmaxSVdeff,G(S). Since fA and fA¯ are weakly-supermodular, we can recurse and induct on 𝖢𝖱-(fA,G[A])-𝖭𝖣𝖯 and 𝖢𝖱-(fA¯,G[A¯])-𝖭𝖣𝖯 instances, both of which have fewer nodes, to obtain partitions of A and A¯; we combine these to obtain V1,,Vk. Theorem 4.5 (a) and the induction hypothesis then readily yield part (a) here. The only thing to note is that since the induction hypothesis yields FδG[A](Vi) for a part ViA, and FδG(A) by Theorem 4.5 (a), we have FδG(Vi). Similarly, FδG(Vi) for any part ViA¯.

Part (b) follows similarly from Theorem 4.5 (b). Part (c) follows from part (b), because it is not hard to see, using part (b), that any convex combination of feasible solutions to (CRLPf,G) yields a convex combination of feasible (NDPfi,G[Vi])-solutions, and vice versa.

One may wonder if the (fi,G[Vi])-𝖭𝖣𝖯-instances in the decomposition of Theorem 4.1 can be specified more directly or succinctly. In the full version, we prove some properties of the decomposition given by its proof, which as a consequence, enable one to do so. But we need our splitting approach to argue why this succinct description fulfills the properties in Theorem 4.1. The properties we establish also imply that the decomposition in Theorem 4.1 can be computed efficiently given suitable algorithmic access to the base cut-requirement function f.

5 Algorithmic implication: LP-relative 𝟐-approximation algorithm

We now exploit the decomposition result stated in Theorem 4.1, and Corollary 4.2, to obtain a 2-approximation algorithm. We assume that we have a separation oracle for (CRLPf,G), which implies that we can efficiently find an extreme-point optimal solution to (CRLPf,G) and any LP that arises in a subsequent iteration after fixing some xe variables to 1 (Fact 2.2).

Algorithm 1 CRNDP-Alg.
 Remark 5.1.

The collection of small cuts does not change across iterations; that is, S is a small-(f,G)-cut iff it is a small-(f,G)-cut in some other iteration. This is because, for any SV, we change |δG(S)| and f(S) by the same amount in every iteration. In the first iteration, we have x^e=1 for every eδG(S) and every small cut S, and so δG(S)= in any subsequent iteration. So we do not have any constraints for small cuts in subsequent iterations, and this causes problems with uncrossing tight constraints. Nevertheless, we are able to argue, due to our decomposition result, that there is always some edge with x^e1/2.

Theorem 5.2.

Let 𝑂𝑃𝑇 denote the optimal value of (CRLPf,G). Algorithm CRNDP-Alg returns a feasible 𝖢𝖱-f-𝖭𝖣𝖯-solution FE such that c(F)2𝑂𝑃𝑇.

Proof.

By Corollary 4.2, at least one edge gets added to F in every iteration, so the algorithm terminates in at most |E| iterations. The cost bound follows by induction on the number of iterations to termination. The base case is trivial. Suppose F=Z1F, where F is the solution found in subsequent iterations for the instance 𝖢𝖱-(f,G)-𝖭𝖣𝖯. Let 𝑂𝑃𝑇 be the optimal solution to (CRLPG,f). Then, by induction, we have c(F1)2𝑂𝑃𝑇 and 𝑂𝑃𝑇eEcex^e, since (x^e)eE is a feasible solution to (CRLPf,G). We also have c(Z1)2eZ1cex^e. Therefore, c(F)2cTx^=2𝑂𝑃𝑇.

Since (CRLPf𝖲𝖭𝖣𝖯,G) admits a polytime separation oracle (Lemma 2.3), we obtain the following result as a corollary.

Theorem 5.3.

There is a 2-approximation algorithm for 𝖢𝖱-𝖲𝖭𝖣𝖯.

6 Hardness result

We now show that cut-relative 𝖲𝖭𝖣𝖯 and path-relative 𝖲𝖭𝖣𝖯 are APX-hard, even when the base 𝖲𝖭𝖣𝖯 instance involves only one s-t pair, by showing that the k-edge connected subgraph (k-𝖤𝖢𝖲𝖲) problem can be cast as a special case of these problems. (This hints at the surprising amount of modeling power of {cut, path}- relative 𝖲𝖭𝖣𝖯.) Previously, even NP-hardness of path-relative 𝖲𝖭𝖣𝖯 in the s-t case was not known.

Let (G=(V,E),{ce}eE) be an instance of k-𝖤𝖢𝖲𝖲. We may assume that G is at least k-edge connected, i.e., |δG(S)|k for all SV, as otherwise there is no feasible solution (and this can be efficiently detected).

Consider the following path-relative 𝖲𝖭𝖣𝖯 instance. We add a source s and sink t, and edges sv,vt of cost 0, for all vV. Let G=(V,E) denote this graph. The base-𝖲𝖭𝖣𝖯 instance asks for (k+n)-edge connectivity between s and t, where n=|V|. That is, the base cut-requirement function f is given by f(S)=k+n if SV is an s-t cut, and f(S)=0 otherwise. We show that path-relative 𝖲𝖭𝖣𝖯 and cut-relative 𝖲𝖭𝖣𝖯 are actually equivalent in this case, and that they encode k-𝖤𝖢𝖲𝖲 on the graph G.

Theorem 6.1.

HE is a feasible solution to the above {cut, path}-relative 𝖲𝖭𝖣𝖯 instance HδG(s)δG(t) and H(V) is a feasible k-𝖤𝖢𝖲𝖲-solution for G. Hence, this {cut,path}-relative 𝖲𝖭𝖣𝖯 instance is the same as k-𝖤𝖢𝖲𝖲 on the graph G.

Proof.

Recall that we are assuming that G is (at least) k-edge connected. The following observation will be handy. The only small cuts in G are {s} and {t} (and their complements). For any other s-t cut SV, taking S=SV, we have that SV. So we have |δG(S)|=|δG(S)|+|S|+|VS|k+n.

direction.

We argue that H is feasible for cut-relative 𝖲𝖭𝖣𝖯, which also implies that it is feasible for path-relative 𝖲𝖭𝖣𝖯. Clearly, H covers both small cuts. For any other s-t cut SV, taking S=SV, we have |δH(S)||δH(V)(S)|+|S|+|VS|k+n, since H(V) is a feasible k-𝖤𝖢𝖲𝖲-solution for G.

direction.

Suppose that H is feasible for path-relative 𝖲𝖭𝖣𝖯. If there is some edge svH, then consider the fault-set F=δG(s){sv}. Then HF clearly has no s-t path, since δHF(s)=. But GF has an s-t path sv,vt. So we must have HδG(s). A similar argument shows that HδG(t).

We next argue that |δH(S)|n+k for every s-t cut S for which S:=SVV. This is equivalent to showing that |δH(V)(S)|k, since |δH(S)δG(s)|+|δH(S)δG(t)|=n. Assume that sS without loss of generality. Suppose |δH(V)(S)|<k. Since |δG(S)|k, there is some edge uvδG(S)δH(V)(S). Suppose uS. Consider the fault-set F=δH(V)(S){sw:wVS}{wt:wS}. Then |F|<k+n and HF has no s-t path, since we have constructed F to ensure that δHF(S)=. However, GF has an s-t path: su,uv,vt. This contradicts that H is feasible for path-relative 𝖲𝖭𝖣𝖯.

So we have shown both that H(V) is feasible k-𝖤𝖢𝖲𝖲 solution for G, and that H is feasible for cut-relative 𝖲𝖭𝖣𝖯.

Since the cost of the edges in EE is 0, the above {cut, path}-relative 𝖲𝖭𝖣𝖯 instance is exactly the same as k-𝖤𝖢𝖲𝖲 on the graph G.

7 Non-equivalence of path-relative SNDP and cut-relative SNDP

We consider the same graph and base 𝖲𝖭𝖣𝖯 instance as in Fig. 1. The graph is reproduced below for convenience, and recall that the base cut-requirement function models s-t 2-edge connectivity: so f(S)=2 if S is an s-t cut, and f(S)=0 otherwise.

Refer to caption
Figure 2: An instance where path-relative 𝖲𝖭𝖣𝖯 and cut-relative 𝖲𝖭𝖣𝖯 are not equivalent. The number labeling an edge gives the cost of the edge.

A feasible solution to path-relative 𝖲𝖭𝖣𝖯 is given by the edge-set H1={su,uw,sw,wt}, which has cost 3. (This is in fact an optimal solution to path-relative 𝖲𝖭𝖣𝖯.)

However, H1 is not feasible for cut-relative 𝖲𝖭𝖣𝖯. This is because, we require δH({s,u,w})min{2,3}=2 in any feasible 𝖢𝖱-𝖲𝖭𝖣𝖯 solution H. Moreover, one can infer that any feasible 𝖢𝖱-𝖲𝖭𝖣𝖯-solution must include all but one of the edges from {su,uw,sw,sv,vw}. This is because for any F{su,uw,sw,sv,vw} with |F|=2, one can verify that there is an s-t cut S such that |δG(S)|=3 and FδG(S); so |δGF(S)|1, which implies that there is no feasible solution that excludes F. A feasible 𝖢𝖱-𝖲𝖭𝖣𝖯-solution must also include the edge wt, so the optimal value for cut-relative 𝖲𝖭𝖣𝖯 is 4.

While cut-relative 𝖲𝖭𝖣𝖯 and path-relative 𝖲𝖭𝖣𝖯 are not in general equivalent, they are closely related. Dinitz et al. [9] showed (see Lemma A.1 in [9]) that one can give a cut-based formulation for path-relative 𝖲𝖭𝖣𝖯, where H is feasible iff |δH(S)|min{f(S),|δG(S)|} for every SV such that G[S] and G[VS] are connected graphs, where VV is the vertex-set of the component containing S. That is, we require the cut-constraints of 𝖢𝖱-𝖲𝖭𝖣𝖯 to hold for a suitable collection of node-sets (as opposed to all node-sets in 𝖢𝖱-𝖲𝖭𝖣𝖯). This immediately implies that 𝖢𝖱-𝖲𝖭𝖣𝖯 and path-relative 𝖲𝖭𝖣𝖯 are equivalent when the underlying graph is a (capacitated) complete graph. Also, as mentioned earlier, path-relative k-𝖤𝖢𝖲𝖲 and cut-relative k-𝖤𝖢𝖲𝖲 are equivalent [8].

References

  • [1] A. Agrawal, Phil Klein, and R. Ravi. When trees collide: An approximation algorithm for the generalized Steiner problem on networks. SIAM Journal on Computing, 24:440–456, 1995. doi:10.1137/S0097539792236237.
  • [2] Ishan Bansal. A global analysis of the primal-dual method for edge-augmentation problems. In Proceedings of the 26th IPCO, pages 58–71, 2025. doi:10.1007/978-3-031-93112-3_5.
  • [3] Ishan Bansal, Joseph Cheriyan, Logan Grout, and Sharat Ibrahimpur. Improved approximation algorithms by generalizing the primal-dual method beyond uncrossable functions. Algorithmica, 86(8):2575–2604, 2024. doi:10.1007/S00453-024-01235-2.
  • [4] Nikhil Bansal, Rohit Khandekar, Jochen Könemann, Viswanath Nagarajan, and Britta Peis. On generalizations of network design problems with degree bounds. Mathematical Programming, 141(1-2):479–506, 2013. doi:10.1007/S10107-012-0537-8.
  • [5] Nikhil Bansal, Rohit Khandekar, and Viswanath Nagarajan. Additive guarantees for degree-bounded directed network design. SIAM Journal on Computing, 39(4):1413–1431, 2009. doi:10.1137/080734340.
  • [6] Sylvia C. Boyd, Joseph Cheriyan, Arash Haddadan, and Sharat Ibrahimpur. Approximation algorithms for flexible graph connectivity. Mathematical Programming, 204:493–516, 2024. doi:10.1007/S10107-023-01961-5.
  • [7] Chandra Chekuri and Rhea Jain. Approximation algorithms for network design in non-uniform fault models. In Proceedings of the 50th ICALP, pages 36:1–36:20, 2023. doi:10.4230/LIPICS.ICALP.2023.36.
  • [8] Michael Dinitz, Ama Koranteng, and Guy Kortsarz. Relative survivable network design. In Proceedings of the 25th APPROX, pages 41:1–41:19, 2022. doi:10.4230/LIPICS.APPROX/RANDOM.2022.41.
  • [9] Michael Dinitz, Ama Koranteng, Guy Kortsarz, and Zeev Nutov. Improved approximations for relative survivable network design. In Proceedings of the 21st WAOA, pages 190–204, 2023. doi:10.1007/978-3-031-49815-2_14.
  • [10] M. Goemans and D. Williamson. A general approximation technique for constrained forest problems. SIAM J. on Computing, 24:296–317, 1995. doi:10.1137/S0097539793242618.
  • [11] M. Goemans and D. Williamson. The primal-dual method for approximation algorithms and its application to network design problems. In Dorit Hochbaum, editor, Approximation algorithms for NP-hard problems, chapter 4. PWS Publishing Company, 1996.
  • [12] Michel X. Goemans, Andrew V. Goldberg, Serge A. Plotkin, David B. Shmoys, Éva Tardos, and David P. Williamson. Improved approximation algorithms for network design problems. In Proceedings of the 5th SODA, pages 223–232, 1994. URL: http://dl.acm.org/citation.cfm?id=314464.314497.
  • [13] M.X. Goemans. Minimum bounded-degree spanning trees. In Proceedings of the 47th FOCS, pages 273–282, 2006.
  • [14] Martin Grötschel, Lászlo Lovász, and Lex Schrijver. Geometric algorithms and combinatorial optimization. Algorithms and Combinatorics 2. Springer, 1993.
  • [15] Kamal Jain. A factor 2 approximation algorithm for the generalized Steiner network problem. Combinatorica, 21(1):39–60, 2001. doi:10.1007/S004930170004.
  • [16] N. Klein and N. Olver. Thin trees for laminar families. In Proceedings of the 64th FOCS, 2023.
  • [17] Lap Chi Lau, Seffi Naur, Mohammad Salavatipour, and Mohit Singh. Survivable network design with degree or order constraints. SIAM Journal on Computing, 39(3):1062–1087, 2009. doi:10.1137/070700620.
  • [18] Lap Chi Lau, R. Ravi, and Mohit Singh. Iterative methods in combinatorial optimization. Cambridge University Press, 2011.
  • [19] Mohit Singh and Lap Chi Lau. Approximating minimum bounded degree spanning trees to within one of optimal. In Proceedings of the 39th STOC, pages 661–670. ACM, 2007. doi:10.1145/1250790.1250887.
  • [20] David P. Williamson, Michel X. Goemans, Milena Mihail, and Vijay V. Vazirani. A primal-dual approximation algorithm for generalized steiner network problems. Combinatorica, 15(3):435–454, 1995. doi:10.1007/BF01299747.