Algorithmes en ligne pour le contrôle d admission

Similar documents
SUBJECTIVE QUALITY OF SVC-CODED VIDEOS WITH DIFFERENT ERROR-PATTERNS CONCEALED USING SPATIAL SCALABILITY

On the robust guidance of users in road traffic networks

Gis-Based Monitoring Systems.

A technology shift for a fireworks controller

Tutorial: Using the UML profile for MARTE to MPSoC co-design dedicated to signal processing

Optical component modelling and circuit simulation

3D MIMO Scheme for Broadcasting Future Digital TV in Single Frequency Networks

Power- Supply Network Modeling

Compound quantitative ultrasonic tomography of long bones using wavelets analysis

RFID-BASED Prepaid Power Meter

Design of Cascode-Based Transconductance Amplifiers with Low-Gain PVT Variability and Gain Enhancement Using a Body-Biasing Technique

A 100MHz voltage to frequency converter

UML based risk analysis - Application to a medical robot

Dynamic Routing and Spectrum Assignment with Non-Disruptive Defragmentation

Radio Network Planning with Combinatorial Optimization Algorithms

Stewardship of Cultural Heritage Data. In the shoes of a researcher.

100 Years of Shannon: Chess, Computing and Botvinik

Opening editorial. The Use of Social Sciences in Risk Assessment and Risk Management Organisations

Dictionary Learning with Large Step Gradient Descent for Sparse Representations

Influence of ground reflections and loudspeaker directivity on measurements of in-situ sound absorption

Indoor MIMO Channel Sounding at 3.5 GHz

QPSK-OFDM Carrier Aggregation using a single transmission chain

BANDWIDTH WIDENING TECHNIQUES FOR DIRECTIVE ANTENNAS BASED ON PARTIALLY REFLECTING SURFACES

VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process

MODELING OF BUNDLE WITH RADIATED LOSSES FOR BCI TESTING

Concepts for teaching optoelectronic circuits and systems

Small Array Design Using Parasitic Superdirective Antennas

Towards Decentralized Computer Programming Shops and its place in Entrepreneurship Development

Application of CPLD in Pulse Power for EDM

A New Approach to Modeling the Impact of EMI on MOSFET DC Behavior

On the role of the N-N+ junction doping profile of a PIN diode on its turn-off transient behavior

L-band compact printed quadrifilar helix antenna with Iso-Flux radiating pattern for stratospheric balloons telemetry

Electronic sensor for ph measurements in nanoliters

Linear MMSE detection technique for MC-CDMA

FeedNetBack-D Tools for underwater fleet communication

High finesse Fabry-Perot cavity for a pulsed laser

A design methodology for electrically small superdirective antenna arrays

Adaptive Inverse Filter Design for Linear Minimum Phase Systems

A Tool for Evaluating, Adapting and Extending Game Progression Planning for Diverse Game Genres

The Galaxian Project : A 3D Interaction-Based Animation Engine

Finding the median of three permutations under the Kendall-tau distance

DUAL-BAND PRINTED DIPOLE ANTENNA ARRAY FOR AN EMERGENCY RESCUE SYSTEM BASED ON CELLULAR-PHONE LOCALIZATION

A sub-pixel resolution enhancement model for multiple-resolution multispectral images

Globalizing Modeling Languages

A notched dielectric resonator antenna unit-cell for 60GHz passive repeater with endfire radiation

Study on a welfare robotic-type exoskeleton system for aged people s transportation.

Wireless Energy Transfer Using Zero Bias Schottky Diodes Rectenna Structures

Gathering an even number of robots in an odd ring without global multiplicity detection

Adaptive noise level estimation

Convergence Real-Virtual thanks to Optics Computer Sciences

PANEL MEASUREMENTS AT LOW FREQUENCIES ( 2000 Hz) IN WATER TANK

STUDY OF RECONFIGURABLE MOSTLY DIGITAL RADIO FOR MANET

Process Window OPC Verification: Dry versus Immersion Lithography for the 65 nm node

Modelling and Hazard Analysis for Contaminated Sediments Using STAMP Model

Long reach Quantum Dash based Transceivers using Dispersion induced by Passive Optical Filters

Augmented reality as an aid for the use of machine tools

Benefits of fusion of high spatial and spectral resolutions images for urban mapping

Computational models of an inductive power transfer system for electric vehicle battery charge

A multi-sine sweep method for the characterization of weak non-linearities ; plant noise and variability estimation.

Improvement of The ADC Resolution Based on FPGA Implementation of Interpolating Algorithm International Journal of New Technology and Research

Performance of Frequency Estimators for real time display of high PRF pulsed fibered Lidar wind map

Arcing test on an aged grouted solar cell coupon with a realistic flashover simulator

RAMS analysis of GNSS based localisation system for the train control application

Compromis énergie-délai pour la collecte de données dans les réseaux de capteurs

Dynamic Platform for Virtual Reality Applications

Bridging the Gap between the User s Digital and Physical Worlds with Compelling Real Life Social Applications

Interactive Ergonomic Analysis of a Physically Disabled Person s Workplace

Sound level meter directional response measurement in a simulated free-field

Demand Response by Decentralized Device Control Based on Voltage Level

An improved topology for reconfigurable CPSS-based reflectarray cell,

Sparsity in array processing: methods and performances

A simple LCD response time measurement based on a CCD line camera

Measures and influence of a BAW filter on Digital Radio-Communications Signals

A perception-inspired building index for automatic built-up area detection in high-resolution satellite images

Link Quality Metrics in Large Scale Indoor Wireless Sensor Networks

Indoor Channel Measurements and Communications System Design at 60 GHz

Design Space Exploration of Optical Interfaces for Silicon Photonic Interconnects

HCITools: Strategies and Best Practices for Designing, Evaluating and Sharing Technical HCI Toolkits

Safety critical software construction using CPN modeling and B method s proof

Simulation Analysis of Wireless Channel Effect on IEEE n Physical Layer

Assessment of Practical Energy Savings in Cellular Networks

An image segmentation for the measurement of microstructures in ductile cast iron

Probabilistic VOR error due to several scatterers - Application to wind farms

New paradigm in design-manufacturing 3Ds chain for training

Exploring Geometric Shapes with Touch

Gate and Substrate Currents in Deep Submicron MOSFETs

Comparison of antenna measurement results in disturbed environment using a VHF spherical near field system

On the Use of Vector Fitting and State-Space Modeling to Maximize the DC Power Collected by a Wireless Power Transfer System

A generalized white-patch model for fast color cast detection in natural images

New Structure for a Six-Port Reflectometer in Monolithic Microwave Integrated-Circuit Technology

A high PSRR Class-D audio amplifier IC based on a self-adjusting voltage reference

PMF the front end electronic for the ALFA detector

Diffusion of foreign euro coins in France,

Régulation des fonctions effectrices anti-tumorales par les cellules dendritiques et les exosomes : vers la désignation de vaccins antitumoraux

Two Dimensional Linear Phase Multiband Chebyshev FIR Filter

Floating Body and Hot Carrier Effects in Ultra-Thin Film SOI MOSFETs

Characterization of Few Mode Fibers by OLCI Technique

Improving Ad Hoc Networks Capacity and Connectivity Using Dynamic Blind Beamforming

Robust Optimization-Based High Frequency Gm-C Filter Design

Development of an On-Chip Sensor for Substrate Coupling Study in Smart Power Mixed ICs

Transcription:

Algorithmes en ligne pour le contrôle d admission Jérémie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas To cite this version: Jérémie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas. Algorithmes en ligne pour le contrôle d admission. 18ème Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (ALGOTEL 2016), May 2016, Bayonne, France. ALGOTEL 2016-18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications. <hal-01302332v2> HAL Id: hal-01302332 https://hal.archives-ouvertes.fr/hal-01302332v2 Submitted on 29 Apr 2016 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Distributed under a Creative Commons Attribution 4.0 International License

Algorithmes en ligne pour le contrôle d admission Jérémie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas Mathematical and Algorithmic Science Lab, France Research Center, Huawei Technologies En délégant le contrôle d?un réseau à des serveurs de calcul puissants, les architectures orientées logiciel permettent désormais l utilisation en ligne d outils apprentissage et d optimisation. Dans ce contexte, ce papier étudie le problème du contrôle d admission pour maximiser dans le temps le volume de trafic accepté. Il formule le problème de routage comme un problème de sac à dos, puis propose des adaptations d?algorithmes en ligne issues de la littérature. Il suggère ensuite d utiliser l algorithme expert intitulé Strategic Expert meta-algorithm (SEA) pour décider en temps réel de l algorithme en ligne à utiliser en fonction des conditions de trafic. Le papier présente une évaluation de cette architecture dans des conditions réalistes et illustre le gain en terme de trafic réseau accepté. Keywords: Réseaux logiciel, Algorithmes en ligne, Apprentissage, Routage, Contrôle d admission 1 Introduction Software-Defined Networking (SDN) technologies provide programmable data planes that can be configured from a remote controller. This separation between control and data planes creates an opportunity to implement routing processes that are more efficient than classic ones: in fact, the controller can take real-time decisions at a (logically) centralized location using an accurate and global view of the network. A key task of the SDN controller is the Admission Control (AC) on incoming connection requests. Its goal is to gracefully manage service requests when the network becomes loaded. AC accepts or drops new requests depending on the resource availability. Non-myopic decisions have to be made with the aim of maximizing a given profit, such as the total accepted throughput, the financial revenue or the quality of service experienced by users. Nowadays, most of the deployed AC procedures are threshold-based. They use max-, min-, exclusive- and non-exclusive-limits on resource portions that the network operator can define for different classes of flows. The main problem here lies in defining the threshold in a dynamic fashion, as the optimal configuration depends on the network traffic conditions, which fluctuate over time. In this paper we wish to raise the awareness that the ability of SDN controllers to centrally manage the network is an opportunity to revisit the way AC is performed. More specifically, we propose to extend online algorithms originally conceived for covering and packing problems. We then take a step further, and we propose to exploit the computational power offered by SDN controllers to implement machine learning techniques to boost performance (e.g., in terms of accepted throughput) via expert meta-algorithms, which are able to adaptively track the best AC algorithm without knowing the traffic statistics a priori. Specifically, we pinpoint a meta-algorithm called Strategic Expert meta-algorithm (SEA) [dfm03] which shows theoretical guarantees under our reactive scenario, on which there is little research. 2 Offline Admission Control We represent the network as a capacitated graph G(V,E), where V and E are the set of nodes and directed edges in the graph, respectively. Let n = V denote the number of nodes in the graph. Each link e E has capacity u e. Connection requests arrive sequentially, and we denote the set of all connection requests by K.

Jérémie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas The i-th request, with guaranteed bandwidth r i, is described by a source-destination pair (s i,d i ), a pair of non-negative starting and ending times (ti s,t f i ) and a profit b i. We denote P i as the set of feasible paths for connection request i (if i is accepted). We define f (i, p) as the portion of flow i that has been allocated to path p P i. Since we do not deal with fractional routing, f (i, p) {0,1}, i.e., only one path can be used for each flow. The objective of the offline admission control problem is to maximize the total profit over the whole sequence of requests, known a priori, as follows: max b i f (i, p) (1) f i K p P i s.t. f (i, p)r i (t) u e, e E, t 0 (2) i K p P i e p p P i f (i, p) 1, f (i, p) {0,1}. i K Nevertheless, solving (1) is not possible in practice: the controller receives information on the arrival and departures of requests as soon as they occur, and it has to make a decision on-the-fly. 3 Online Admission Control Algorithms Traditionally, online algorithms for admission control fall into two categories: i) worst-case and ii) averagecase. i) Worst-case algorithms are characterized by max-min performance guarantees under specific worstcase scenarios where a malicious adversary chooses the worst possible sequence of connection requests. 3.1 Worst-case Admission Control (AC) Algorithms Among the worst-case scenario AC algorithm, we first mention AAP algorithm [AAP93], taking admission control decisions based on the current utilization of network links. It computes path costs over a modified network graph where weights depend exponentially on the link utilization. This trick aims at pre-emptively driving traffic away from the links being highly utilized. The acceptance decision is based on a comparison between the cost of accepting the request and the resulting maximum future accepted throughput. Authors of AAP showed that the algorithm has a competitive ratio of O(log(n)) for any sequence of relatively small requests. This means that the number of accepted requests is in the worst-case O(log(n)) smaller than the number of requests that could be routed by the optimal solution of the offline problem in (1). AAP may not be easy to implement in reality, as it requires the a priori knowledge of requests duration. However, Buchbinder et al. proposed in [BN09] a primal-dual framework to derive a practical algorithm with the same performance guarantees. The rationale behind it is that, when a demand arrives, the corresponding primal and dual variables are set while maintaining feasibility in both problems and while making sure that the derivative of the primal objective subject to the new dual variable evolves linearly with respect to primal variables, as proposed by [BN09]. The second constraint guarantees the competitiveness of the algorithm. In the same manner as AAP, the acceptance decisions is taken by comparing the request cost (primal cost increase) and its profit (dual cost increase). We describe the steps of the Primal-Dual version of the AAP algorithm in Alg. 1, by using more efficient incremental updates of the primal variable x e. 3.2 Beyond Worst-case AC Algorithms We now turn our attention towards online average-case (also called stochastic ) algorithms, showing good expected performance under random traffic conditions. Agrawal et al. [AD15] have proposed a fast algorithm with multiplicative updates to solve this issue. This recent algorithm described in Alg. 2 works for general convex problems. It applies to i.i.d. and random order inputs. It solves an online convex problem where the objective function is defined as the difference between the sum of rewards and the cost of accepted objects. The updates of θ and w are standard multiplicative weight updates used in the context of For simplicity, we will denote r i (t) = r i for all t [t s i,t f i ] and r i(t) = 0 otherwise.

Algorithmes en ligne pour le contrôle d admission Algorithm 1 Primal-Dual AAP Algorithm [BN09] Initialize x e = 0 function ROUTE(request j) if a path P P j of cost < 1 in the graph weighted by x e then Route request j on P for each edge e P do x e = x e exp ln(1+n).r j ue end for else Reject request j end if end function + 1 n (exp ln(1+n).r j ue 1) online optimization. Moreover, Agrawal et al. provide an alternative definition of competitive ratio as the ratio between the average reward and the average optimal reward. In this sense, the algorithm is 1 O(ε)- competitive for any ε > 0 such that min(b,k.opt) > log( E )/ε 2 for a simple online covering packing problem. We adapted it to our multi-commodity flow problem. The Primal-Beats-Dual (PBD) algorithm has also been introduced by Kesselheim et al. in [KTRV14] for online packing problems with a finite number of objects. We considered it in our evaluation but it requires to solve a large LP at each step, which impacts on its scalability. Algorithm 2 Agrawal s Algorithm [AD15] Initialize θ 1,e = 1 1+ E, e E. Initialize w 0,e = 1, e E. Initialize Z = OPT (B/T ) function ROUTE(request j) Consider G(V,E) with edge cost of Zθ j,e, e E if p is a feasible min cost path in G then Route request j on p Perform the following multiplicative updates: w j+1,e = w j,e (1 + ε) (r j u e /T ), e E AND θ j+1,e = w j,e 1+ k w j,k, e E else Reject request j end if end function 4 Admission Control with Experts in SDN As shown in Sec.5, there is no algorithm that outperforms all the other ones under all traffic conditions. Hence, due to the unpredictable nature of traffic, it proves difficult to know a priori the identity of the best algorithm to be utilized. We thus need an online meta-algorithm that, based on past decisions and past rewards obtained by the different AC algorithms, can track and follow the best AC algorithm in hindsight. This setting is classical in machine learning, and it is called prediction with expert advice. To be more formal, let us define m i, j as the traffic volume accepted by the AC algorithm i when request j arrives. The meta-algorithm takes its decisions iteratively, based on the profit m i, j obtained by each AC algorithms i over past decision instants j j. The bulk of the literature focuses on proving theoretical performance bounds in the basic non-reactive scenario where the action taken by the decision maker does not affect the state of the system. Nevertheless, our AC scenario is clearly a reactive one, since the decision taken at time t also influences the decisions (and the profits) of the AC algorithms at future time instants t > t. To this aim, we hence propose to use Strategic Expert meta-algorithm (SEA), described in Alg. 3. SEA selects algorithm i for an increasing number N i > 1 of consecutive steps, and does not revisit its choice at each new connection request. This allows each online AC algorithm to approach its asymptotically average performance. Moreover, SEA is only based on the profit effectively obtained by each algorithm when it has been actually selected. In other words, SEA does not exploit the information in hindsight on the profits that would have been obtained if a different algorithm had been used (as for FLA). SEA s performance guarantees are evaluated in terms of the regret with respect to a (non implementable) oracle which steadily selects the algorithm with best average performance, known beforehand. In our

Jérémie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas Algorithm 3 Strategic Expert Meta-Algorithm (SEA) [dfm03] Set M i = N i = 0 for each expert i. Set k = 1. function EXPERT SELECTION(Sequence of requests) With probability 1/k perform an exploration phase, namely, choose an expert i from the uniform distribution over 1,...,N; otherwise, perform an exploitation phase, namely, choose an expert i with maximum M i. (If such i is not unique, select one out of a uniform distribution) Set N i = N i + 1. Follow expert i for the next N i requests. Denote by R the average payoff accumulated during the current phase (i.e., these N i stages), and set M i = M i + N 2 i +1 ( R M i ) Set k = k + 1. end function reactive scenario and under some stationary conditions on the system (in our case, of the traffic load on the links) SEA performs on average and asymptotically as well as the oracle ([dfm03], Thm. 5.1). 5 Performance Evaluation and Conclusion To evaluate the algorithms under realistic conditions, we used a dataset captured in 2006 by Uhlig et al. on GEANT. We evaluated the percentage of rejected demands. The traffic matrix is generated with Poisson arrivals at rate λ demands/s. Demands have an equal size of 200 Mb/s and a duration exponentially distributed with mean 30s. We considered random source-destination pairs. We compared the results with the Greedy policy, that accepts all requests on the minimum cost path whenever there is enough capacity. Remarkably, we notice that there is no algorithm that outperforms all the others under all traffic conditions, although their outperform Greedy This behavior naturally calls for a machine learning technique able to track the best AC algorithm under unknown traffic scenarios. In Fig. 1 we show the performance of the SEA expert meta-algorithms which runs on top of three computationally efficient online algorithms: Greedy, AAP-pd and Agrawal s AC algorithm. As expected, SEA always outperforms the naive FLA. The ultimate aim of this paper is to raise the awareness that the new centrally managed SDN architecture, combined with the computational power of the SDN controller, calls for a revisit of admission control algorithms, studied in the computer science literature but never really implemented in practice. (a) Worst-case algs. (b) Stochastic algs. (c) Expert algs. Figure 1: Performance evaluation in terms of rejected demands percentage. Expert algorithms choose among Greedy, Agrawal and AAP-pd. References [AAP93] Baruch Awerbuch, Y. Azar, and S. Plotkin. Throughput-competitive on-line routing. In Proc. FOCS, 1993. [AD15] [BN09] [dfm03] Shipra Agrawal and Nikhil R. Devanur. Fast algorithms for online stochastic convex programming. In Proc. ACM SODA, 2015. Niv Buchbinder and Joseph (Seffi) Naor. Online primal-dual algorithms for covering and packing. Math. Oper. Res., 34(2), May 2009. Daniela Pucci de Farias and Nimrod Megiddo. How to combine expert (and novice) advice when actions impact the environment? In Proc. NIPS, 2003. [KTRV14] Thomas Kesselheim, Andreas Tönnis, Klaus Radke, and Berthold Vöcking. Primal beats dual on online packing lps in the random-order model. In Proc. ACM STOC, 2014.