Efficient Distributed Algorithm for the Location Design and Routing Problem

- DREXEL UNIVERSITY

The Location Design and Routing problem asks to find a subset of “depot” nodes and a spanning forest of a graph such that every connected component in the forest contains at least one depot. This problem arises in a number of both logistical and computer networking problems, for example, in selecting the number and location of distribution centers in vehicle routing networks. This problem is functionally equivalent to that of supernode selection in peer-to-peer networks. A distributed algorithm approximates a solution to this problem that runs in a logarithmic number of communication rounds with respect to the number of nodes (independent of the topology of the network), and, under assumptions on the embedding of the edge weights, whose solutions are within a factor of 2 of optimal.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims benefit of Provisional Application No. 61/314,417 filed Mar. 16, 2010.

GOVERNMENT SUPPORT

This invention was made with government support under Grant No. N00014-08-1-0925 awarded by the Office of Naval Research and under Grant No. DAAB07-01-9-L504 awarded by the U.S. Army CERDEC. The government has certain rights in the invention.

TECHNICAL FIELD

The invention is in the field of computer processing and, more particularly, the invention provides a distributed computer-implemented solution to the location design and routing problem for the creation of an optimized distribution network for product delivery, electronic communications networks, sensor networks, peer-based grid computing, and the like.

BACKGROUND

The Location Design and Routing problem asks one to find a subset of “depot”’ nodes and a spanning forest of a graph such that every connected component in the forest contains at least one depot. See G. Laporte, “Location-routing problems,” in Vehicle Routing: Methods and Studies, B. L. Golden, and A. A. Assad, Eds. Elsevier, 1988, pp. 163-197. A typical scenario takes the form of creating an optimal distribution network. Given a network of roads, how many distribution centers need be built—and in which locations—such that deliveries can be carried out as quickly as possible? What if the cost of building distribution centers is nonuniform with respect to location? Scenarios are not strictly limited to logistical domains; in computer networking and multiagent systems, for example, the unavailability of a central server/database necessitates data redundancy in the system. See M. Peysakhov, R. N. Lass, W. C. Regli, and M. Kam, “An ecological approach to agent population management,” in Proceedings of the Twentieth National Conference on Artificial Intelligence, 2005, pp. 146-151. Many peer-to-peer systems, such as service oriented architectures and distributed hash tables, promote certain nodes to be supernodes. In this setting, the supernodes are akin to the depots in the location design and routing problem. The problem of selecting which subset of peers should perform a certain role such that they are well dispersed in the network—what is referred to as the supernode selection problem (V. Lo, D. Zhou, Y. Liu, C. Gauthier-Dickey, and J. Li, “Scalable supernode selection in peer-to-peer overlay networks,” in Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, Washington, D.C., USA: IEEE Computer Society, 2005, pp. 18-27) is therefore equivalent to the location design and routing problem. Such problems also appear in the fields of sensor networks and peer-based grid computing.

FIG. 1 provides an example of a weighted distribution network (FIG. 1(a)), along with two optimal solutions, FIGS. 1(b) and 1(c), depending on the cost of opening a depot. In general, finding a set of depots and a spanning forest of minimal weight is NP-Hard (J. Melechovsky, C. Prins, and R. W. Calvo, “A metaheuristic to solve a location-routing problem with non-linear costs,” Journal of Heuristics, vol. 11, no. 5-6, pp. 375-391, 2005).

The sequential variant of the Location Design and Routing problem has been thoroughly studied in the literature (See. e.g., M. X. Goemans and D. P. Williamson, “A general approximation technique for constrained forest problems,” SIAM Journal on Computing, vol. 24, pp. 296-317, 1995), culminating in the discovery that the problem submits to bounded approximation in polynomial time. There are, therefore, three primary motivations for developing a distributed approximated solution to the problem:

1. The problem itself is naturally distributed—there may not be an obvious central node in which to perform the desirable optimizations;

2. Local properties of the underlying networks seen to allow for speedups from distributed processing; and

3. In certain environments, such as sensor networks, hardware restrictions might necessitate decentralization in order to save memory and computational resources.

Although there is very little in the literature on the parallelization and distribution of this specific problem, the related problem of finding a minimum spanning forest has been widely studied and are known to be soluble in logarithmic time with a linear number of processors. (See S. Halperin and U. Zwick, “Optimal randomized EREW PRAM algorithms for finding spanning forests and for other basic graph connectivity problems,” in Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, Pa., USA: Society for Industrial and Applied Mathematics, 1996, pp. 438-447, and R. Cole, P. N. Klein, and R. E. Tarjan, “Finding minimum spanning forests in logarithmic time and linear work using random sampling,” in Proceedings of the Eighth Annual ACM Symposium on Parallel Algorithms and Architectures, New York, N.Y., USA: ACM, 1996, pp. 243-250.) In fact, finding a minimum spanning forest is a special case of the location design and routing problem in which depot opening costs are very large (i.e., greater than the diameter of the graph). To the best of the inventors' knowledge, however, the converse is not true: There is no known trivial reduction from the location design and routing problem to the spanning forest problem.

Proposing distributed algorithms using the primal/dual schema has also been the subject of study of a number of recent results. See A. Panconesi, Fast Distributed Algorithms Via Primal-Dual (Extended Abstract), Heidelberg: Springer, 2007, vol. 4474/2007, pp. 1-6. Problems that have been studied using this schema include Steiner problems (M. Santos, L. M. A. Drummond, and E. Uchoa, A Distributed Primal-Dual Heuristic for Steiner Problems in Networks, Springer, 2007, vol. 4525/2007, pp. 175-188), point-to-point connectivity problems (R. C. Corrêa, F. C. Gomes, C. A. S. Oliveira, and P. M. Pardalos, “A parallel implementation of an asynchronous team to the point-to-point connection problem,” Parallel Computing, vol. 29, no. 4, pp. 447-466, 05/2002 2002), distributed scheduling (A. Panconesi and M. Sozio, “Fast distributed scheduling via primal-dual,” in Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, ACM. Munich, Germany: ACM, 2008, pp. 229-235), vertex cover (S. Khuller, U. Vishkin, and N. Young, “A primal-dual parallel approximation technique applied to weighted set and vertex cover,” Journal of Algorithms, vol. 17, no. 2, 280-289, October 1994; and F. Grandoni, J. Könemann, A. Panconesi, and M. Sozio, “Primal-dual based distributed algorithms for vertex cover with semi-hard capacities,” in Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, Las Vegas, Nev., USA, 2005, pp. 118-125), and facility location (M. Sozio, “Efficient distributed algorithms via the primal-dual schema,” Ph.D. Dissertation, “La Sapienza” University, Rome, September 2006). Control theoretic approaches have also been used to solve stochastic variants of the vehicle routing problem (E. Frazzoli and F. Bullo, “Decentralized algorithms for vehicle routing in a stochastic time-varying environment,” in Proceedings of the 43rd IEEE Conference on Decision and Control, vol. 4, December 2004, pp. 3357-3363).

To the best of the inventors' knowledge, however, there is no prior result which theoretically proves a constant bound on the cost of the optimal solution and provides a poly-logarithmic bound on the number of communication rounds for the optimization problem. Algorithms for addressing this problem, including a bounded distributed version of an approximation algorithm for the location design and routing problem that runs in a logarithmic number of communication rounds with respect to the number of nodes, is desired and will be described herein.

SUMMARY OF THE INVENTION

A bounded distributed version of an approximation algorithm for the location design and routing problem that runs in a logarithmic number of communication rounds with respect to the number of nodes (independent of the topology of the network), and whose solutions are within a factor of 2 of optimal under certain assumptions about the distribution of the edge weights in the graph is disclosed. An algorithm and its parallel version for solving the distributed location design and routing problem and a mapping of the problem to an equivalent connectivity problem, as well as techniques for distributing the parallel algorithm in an asynchronous network, are also disclosed.

In an exemplary embodiment, a computer system is programmed by executable instructions to implement a method of identifying nodes or distribution centers for distributing information or materials throughout a network or throughout a geographic area. In the exemplary embodiment, the executable instructions when processed by a processor of the computer implement the steps of:

(a) starting with an empty forest of potential nodes or distribution centers of the network or the geographic area, assigning each potential node or distribution center of the forest to be a member of its own connected component;

(b) for each potential node or distribution center that has not yet been assigned to be a node or distribution center, adding a cut edge of a connected component to the forest and merging the cut edge with a potential node or distribution center on the other end of the cut edge;

(c) when a potential node or distribution center is merged with another potential node or distribution center that has been assigned to a node or distribution center, assigning the same node or distribution center to the potential node or distribution center and stopping a resulting merged node from actively growing; and

(d) repeating steps (a)-(c) until all potential nodes or distribution centers have been assigned to a node or distribution center.

The computer may be further programmed by executable instructions to proceed asynchronously between respective connected components of the forest of potential nodes or distribution centers. Also, the cut edges of the connected components may have different weights.

The scope of the invention further encompasses a computer readable medium containing the executable instructions for implementing the claimed method.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other beneficial features and advantages of the invention will become apparent from the following detailed description in connection with the attached figures, of which:

FIG. 1 illustrates an example of a weighted distribution network, FIG. (a), along with the optimal spanning forest and depot assignment for various depot opening costs, FIG. 1(b) and FIG. 1(c).

FIG. 2(a) provides the augmented graph corresponding to the distribution network in FIG. 1(a) with a uniform depot opening cost of 100.

FIG. 2(b) is the optimal solution to the augmented network, corresponding to the solution in FIG. 1(b).

FIG. 3 illustrates a snapshot of the algorithm solving the augmented distribution network problem of FIG. 2(a).

FIG. 4 is a block diagram representing a general purpose computer system in which aspects of the present invention may be incorporated.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The present invention may be understood more readily by reference to the following detailed description taken in connection with the accompanying figures and examples, which form a part of this disclosure. It is to be understood that this invention is not limited to the specific products, methods, conditions or parameters described and/or shown herein, and that the terminology used herein is for the purpose of describing particular embodiments by way of example only and is not intended to be limiting of any claimed invention. Similarly, any description as to a possible mechanism or mode of action or reason for improvement is meant to be illustrative only, and the invention herein is not to be constrained by the correctness or incorrectness of any such suggested mechanism or mode of action or reason for improvement. Throughout this text, it is recognized that the descriptions refer both to methods and software for implementing such methods.

A detailed description of illustrative embodiments of the present invention will now be described with reference to FIGS. 1-4. Although this description provides a detailed example of possible implementations of the present invention, it should be noted that these details are intended to be exemplary and in no way delimit the scope of the invention.

The Location Design and Routing Problem

Given a graph G=V, E with both vertex and edge weights w: V∪E)→ the Location Design and Routing Problem asks one to find a subset of “depot” vertices DV and a spanning forest FE such that each connected component in F contains at least one depot. The cost of opening a depot at a vertex is modeled using the vertex weights; for example, the cost of opening a depot at vertex v∈V is w(v). Therefore, it is desired to minimize the weight of D and F:

minimize ( d ε D w ( d ) ) + ( e ε F w ( e ) ) subject to : ( d ε D : v is connected to d in F ) , v ε V D V , F E .

For sake of analysis, the representation of this optimization problem can be simplified by recasting it as a connectivity problem. Therefore, the graph may be augmented with special depot vertices di associated with each original vertex vi. Next, an edge is added from each vertex to its associated depot vertex, weighted with the cost of opening a depot at that vertex. The new overall set of edges is the original set of edges unioned with the set of new depot edges. Let R={v1, . . . , vn} be the set of original (input) vertices and let be T={d1, . . . , dn} be the set of new special depot vertices with the new overall set of vertices V=R∪T. A vertex vi will be a part of D (i.e., it will be chosen to become a depot) if the edge from it to its associated depot vertex is a part of the final spanning forest: vi, di∈Fvi∈D. The optimization problem can now be rewritten such that it amounts to finding an acyclic subset of the new edges that connects each v∈R to at least one d∈T. Since this subset is a forest that spans R, it will hereafter be referred to as “the spanning forest.” Note, however, that the spanning forest does not necessarily span all of T. An example of this augmented graph is given in FIG. 2(a), which assumes a uniform opening cost of 100.

Without loss of generality, it may be assumed that w(e) now denotes the edge weights. The new optimization problem on the augmented graph can be captured as the following integer program:

minimize e E w ( e ) x e subject to : x ( δ ( S ) ) S T , S V : S x e ε { 0 , 1 } , e E ,

where each variable χe is an indicator as to whether the edge e is a member of the final spanning forest, δ(S) is the set of edges having exactly one endpoint in S, and χ(F)Σe∈Fχe. Therefore, any forest FE will be a feasible solution to the problem if every connected component S of the forest has at least one depot. Let LP denote the linear programming relaxation of IP obtained by relaxing the integrality restriction on the variables to χe≧0. The dual of LP is:

maximize S V χ ( S T _ ) ys subject to : S : c δ ( S ) ys w e , e E ys 0 , S V : S ,

where χ: X→{0, 1} is an indicator function: χ(X)1X≠. An edge is tight if w(e)=ΣS:e∈δ(S)ys. Let ZLP* be the cost of the optimal solution to LP and let ZIP* be the cost of the optimal solution to IP. It is a folklore result that ZLP*≦ZIP*.

The Solution

Starting with an empty forest, each vertex is a member of its own connected component. Every round, each depot-less component greedily chooses to add one of its cut edges to the forest, merging with the component on the other end of the edge. When a component merges with another component containing a depot, the new component after the union stops actively growing. When all components contain depots the algorithm terminates.

For simplicity, the algorithm is first introduced herein as a parallel algorithm according to the concurrent read exclusive write (CREW) parallel random access machine (PRAM) model. The notation and mathematics required to formally define and model the algorithm are then described. This model will be used below to provide formal bounds on the runtime and performance of the algorithm, and also to prove correctness and completeness. It will also be shown that this same algorithm can be trivially distributed in an asynchronous network.

Let Ft be the partially constructed spanning forest at the beginning of round t. Let Ct be the set of connected components in Ft. For sake of brevity and simplicity, let μt: V→Ct be a function mapping vertices to their associated connected component during round t; therefore, μt(v)Civ∈Ci∈Ct. A vertex that is incident to at least one edge in the cut of its connected component is said to be in the frontier. Let bt: V→ be a mapping of vertices to a real number during round t. These values represent the amount of slack remaining in the dual variables associated with a vertex. An example of this notation is given in FIG. 3.

Now, let Jt: V×V→{0, 1} be a binary relation defining which edges will become tight during round t. Each depot-less component will choose to add the edge in its frontier that has minimal weight and dual variable slack. Therefore, Jt(u, v)=1 if and only if

( μ t ( u ) T = ) ( u , v = arg min ( i , j ) δ ( μ t ( u ) ) w ( i , j ) - b t ( i ) - b t ( j ) ) .

It may be assumed that each edge has a unique identifier over which there is a total ordering. Ties in the minimization are broken based upon the ordering of the edges. Let J+ denote the transitive closure of J. Note that J is not commutative: J(u, v)J(v, u). Also note that as long as there exists a feasible solution to IP then the minimization ensures that each depot-less connected component must have exactly one edge in the frontier that becomes tight each round:


C∈Ct,∃v,u∈δ(C):C∩T=Jt(v,u)=1.

Ft is the partially constructed spanning forest during round t, initialized to F0=V, . The forest is updated each round with the set of all edges that became tight during the round:


Ft+1=Ft∪{u,v∈E:Jt(u,v)VJt(v,u)}.

For a set SV, let ys be the dual variable associated with §. Initially, all such variables are set to zero. Note that in actuality these variables need not be made part of an implementation of the algorithm; they exist solely for the purpose of theoretically proving properties of the algorithm. These dual variables are implicitly updated as follows:

ys { ω ( ( i , j ) ) - b t ( i ) - b t ( j ) 1 + J t ( j , i ) if i S C t , j S : J t ( i , j ) , 0 otherwise . ( 1 )

The b values are initialized such that ∀v∈V: b0(v)=0. They are updated each round such that:


bt+1(v)=bt(v)+yμo(v).  (2)

The value bt(v) can therefore be interpreted as the amount of slack remaining in the dual variables during round t, before an edge incident to vertex v becomes tight.
Let τ be the number of rounds required for the algorithm to terminate—or, in the case of the distributed algorithm, the number of rounds required to reach quiescence. Therefore, τ is the earliest round during which there are no components without depots:

τ = min t N ( C C t : C T ) . ( 3 )

The notation is now sufficient to introduce the parallel version of the algorithm, given in Algorithm 1 below. A snapshot of the algorithm's execution for solving the augmented distribution network problem of FIG. 2(a), along with an example of the notation, is given in FIG. 3. Connected components are visualized as dashed regions. The [round]#; labels denote the round number during which a connected component was created. Directions on the edges represent the component that chose to make that edge tight.

Algorithm 1 The parallel location design and routing algorithm.  1: procedure PARALLEL-LOCATION-DESIGN(G, T, w) Require: G = (V, E) is an undirected graph already augmented with the special depot vertices. T ⊂ V is the set of “special” depot vertices. w : E [ 1 , 3 2 ] is a weight or cost function such that each edge e ε E has an associated cost. μt : V → 2V is a convenience function mapping vertices to their connected component in Ci. Ensure: F′ is the resulting spanning forest.  2:  t ← 0  3:  F ←  /* Implicity set ys = 0 for all S ⊂ V */  4: for all v ∈ V do in parallel  5: S ← {v}  6: μ0(v) ← S  7: C0 ← C0 ∪ {S}  8: b0 (v) ← 0  9:  while ∃C ∈ Ct : C ∩ T =  do 10: t ← t + 1 11: Ct ← Ct−1 12: for all C ∈ Ct−1 do in parallel 13: I(C) ← 0 /* I is a temporary map */ 14: K(C) ←  /* K is a temporary map */ 15: for all C ∈ {S ∈ Ct−1 : C ∩ T = } do in parallel 16: Find an edge e = (u, v) ∈ δ(C) such that u ∈ C and ε = w(e) − bt−1(v) − bt−1(u) is minimized. 17: F ← F ∪ {e} 18: Ct ← Ct ∪ {μt−1(v) ∪ μt−1(u)} − {μt−1(v)} − {μt−1(u)} 19: μt(u) ← μt−1(v) ∪ μt−1(u) 20: K(C) ← μt−1(ν) 21: I(C) ← ε 22: for all v ∈ V do in parallel 23: if K(K(μt−1(v))) = μt−1(v) then 24: I ( μ t - 1 ( υ ) ) I ( μ t - 1 ( v ) ) 2 25: bt(v) ← bt−1(v) + I(μt−1(v)) 26: A ← the keys of I sorted by descending ε value. /* Implicity used for analysis; need not be implemented */ 27: for i ← 1 to |A| do /* Implicit */ 28: for j ← 1 to i do /* Implicit */ 29: yA[j] ← yA[j] + I(A[i]) /* Implicit */ 30:  F′ ← {e ∈ F : For some connected component N of (V, F − {e}) it is true that N ∩ T = }

Analysis

The various performance guarantees of Algorithm 1 will now be explained. First, Lemmas 1 and 2 lead to Proposition 1 which implies that the solutions found by the algorithm are acyclic and thereby forests, implying that they are primal feasible. Proposition 2 states that the main loop (line 9 of Algorithm 1) will have a logarithmic number of iterations. Claim 3 leads to Proposition 3 which states that the solutions found by the algorithm are dual feasible. Finally, Lemma 3 leads to Proposition 4 which states that as long as the edge weights are embedded in the proper metric space then the algorithm is a 2-approximation.

Lemma 1: Any cycle in the intersection graph of Ft+1 formed from Ct must consist solely of edges along the cuts between depot-less components.

Proof:

Assume, on the contrary, that there exists a cycle containing an edge that is incident to at least one component containing a depot. Let u, v be such an edge and assume μt(v) contains at least one depot. (1) implies that v's connected component has no outgoing edges,


i∈μt(v):(∃j∈V:Jt(i,j)),

which contradicts the fact that u, v is in a cycle.
The “Potential Cost” of an edge is the fractional quantity associated with on line 16 of Algorithm 1.

Lemma 2: Any cycle in the intersection graph of Ft+1 formed from Ct must consist of edges of equal potential cost.

Proof:

Let e1=u1, v1 be an edge in a cycle. (1) implies that all edges in a cycle must be cuts between existing connected components. Therefore, μt(u1)≠μt(v1). Furthermore, there must be another edge in the cycle, e2=(u2, v2), such that μt (v2)=μt(u1). It must also be true that Jt(u1, v1)=Jt(u2, v2)=Jt(u1, v2)=1. By Lemma 1 there are no depots in any of the components in the cycle. Therefore, applying (1) gives


w(e1)−bt(u1)−bt(v1)≦w(e2)−bt(u2)−bt(v2).

In general, this inequality will hold for the incoming and outgoing edges of any connected component in the cycle. Therefore, by transitivity,

w ( e 1 ) - b t ( u 1 ) - b t ( v 1 ) w ( e 2 ) - b t ( u 2 ) - b t ( v 2 ) w ( e 2 ) - b t ( u 1 ) - b t ( v 1 ) ,

implying that


w(e1)−bt(u1)−bt(v1)=w(e2)−bt(u2)−bt(v2).

Proposition 1: The intersection graph of Ft+1 formed from Ct is acyclic.

Proof:

Assume, on the contrary, that there is a round t during which a cycle of length l is formed, Since the graph is simple, l>1, By Lemma 2, all of the edges in the cycle must be of equal potential cost. Therefore, each connected component will have had a tie between two frontier edges which must have been broken using the edge ordering. Therefore, either l=1 or there are two edges with the same unique identifier, both of which are contradictions.

Claim 1: If all edge weights are coprime, then Proposition 1 will hold even if the unique identifier ordering assumption does not. Corollary 1 F0, . . . , Fτ are all acyclic.

Proof:

Since, F0=V, , the base case is acyclic. Induction over Proposition 1 then proves the corollary.
Let Af(t)=A(t) be an upper bound on the number of depot-less components at the beginning of round t. Similarly, let Lf(t)=L(t) be an upper bound on the total number of components at the beginning of round t. Then:


A(t)≧|{C∈Ct:C∩T=}|,


and


L(t)≧|Ct|≧A(t).

In general, every depot-less component will union with another component during every round. Regardless of whether such a component chooses to union with a component containing a depot or one that is depot-less, the total number of components will decrease by one half the number of depot-less components. Therefore L(t)=L(t−1)−A(t−1)/2. Now consider the extrema for the change in the number of depot-less components. If all depot-less components choose to union with other depot-less components then A(t)=A(t−1)/2. On the other hand, if as many depot-less components union with components containing depots as possible, then A(t)≦min(A(t−1), L(t−1)−A(t−1)). Therefore, the general recurrences for A(t) and L(t) are:

A ( t ) = max ( A ( t - 1 ) 2 , min ( A ( t - 1 ) , L ( t - 1 ) - A ( t - 1 ) ) ) L ( t ) = L ( t - 1 ) - A ( t - 1 ) 2 . ( 1 )

The initial conditions for the recurrences are:


A(0)=|{C∈C0:C∩T=}|=|R|,


L(0)=|C0|=|R|+|T|=2|R|.

Claim 2: A(t−1)/2 will always dominate in the maximization in M. X. Goemans and D. P. Williamson, “A general approximation technique for constrained forest problems,” SIAM Journal on Computing, vol. 24, pp. 296-317, 1995. Validation of this claim will be given in the proof of the following proposition:

Proposition 2: The algorithm will terminate after a logarithmic number of rounds (i.e., iterations of the main loop on line 9 of Algorithm 1): τ=O(log n).

Proof:

This follows from the fact that the algorithm will terminate once the number of depot-less components is zero:


t∈:A(t)=0t≧τ.

Therefore, the burden of this proof is to show that, the A(t) recurrence will converge exponentially, implying that τ=O(log n).
If Claim 2 holds, then it is clear that the A(t) recurrence will converge exponentially:

A ( t ) = A ( 0 ) 2 t L ( t ) = 2 R - i = 0 t A ( 0 ) 2 i .

Let

k = A ( 0 ) 2 R

and observe that

k = 1 2 .

Substituting 2k|R| for A(0) ensures that the minimization in A(t) will always evaluate to L(t−1)−A(t−1) because ∀t∈: A(t)≧L(t)−A(t).

2 R k 2 t 2 R ( 1 - ( i = 0 t k 2 i ) - k 2 t ) 2 k 2 t 1 - i = 0 t k 2 i k 2 t 1 + 2 t + 1 ,

which is true because 2t/(1+2t+1) is bounded above by ½. Therefore, provided Claim 2 holds, (5) can be simplified to

A ( t ) = max ( A ( t - 1 ) 2 , L ( t - 1 ) - A ( t - 1 ) ) .

claim 2 obviously holds for the base case of t=1 because A(0)/2=2k|R| is bounded below by

L ( 0 ) - A ( 0 ) = 2 R - 2 R 2 .

Therefore, Claim 2 will hold as long as

A ( t ) 2 L ( t ) - A ( t ) .

This equates to

k 2 t + 1 ( 1 - ( i = 0 t k 2 i ) - k 2 t ) 2 × 4 t 2 t + 4 t + 1 ,

which must be true because (2×4t)/(2+4t+1) is bounded above by ½.

Claim 3: Let t′ be the round during which an edge e=u, v is added to the spanning forest. Then e will not be in the cut of any component in a subsequent round:


t>t1,C∈Ct:e∉δ(C).

Proof: μt′+1(u)=μt′+1(v)=μt′(u)∪μt′(v), Therefore, in all rounds subsequent to t′ both endpoints of e are in the same component and therefore cannot be in the frontier.

Proposition 3: The vector y is a feasible solution to D and has the property:

e F w ( e ) e F S : e δ ( S ) ys . _

Proof:

The fact that y is a feasible solution to (D) is a straightforward result of the fact that y is initially zero and is updated according to (2). Let t be the round during which an edge e=u, v∈Fτ was added to the forest. From (3), note that

( b t ( u ) = i = 0 t - 1 y μ i ( u ) ) ( b t ( u ) = i = 0 t - 1 y μ i ( v ) ) .

Furthermore, at the beginning of round t the potential for e is


∈=w(e)−bt(u)−bt(v).

Once e is added to Ft, the dual variables yμt(u) and yμt(v) are updated according to (2). Then there are three, possible cases:

1) μt(u)∩T=μt(v)∩T= and Jt(u, v)=Jt(v, u);

2) μt(u)∩T=μt(v)∩T= and Jt(u, v)≠Jt(v, u); or

3) |μt(u)∩T|+|μt(v)∩T|=1,

In case 1,

y μ t ( u ) + y μ t ( v ) = 1 + J t ( v , u ) + 1 + J t ( u , v ) = ,

implying that
w(e)=Σi=0t yμi(u)+yμi(v). (2) For case 2, assume without loss of generality that Jt(u, v)=1 and Jt(v, u)=0. For case 3, assume without loss of generality that μt(u)∩T= and μt(v)∩T≠. Then for both of these cases note that

y μ i ( u ) = 1 + J t ( v , u ) = ,

implying that
w(e)=yμt(u)i=0t−1 yμi(v). (3) Claim 3 implies that the summations in (6) and (7) comprise all sets that cut e, thus completing the proof.

Lemma 3: Let H be the intersection graph of the final spanning, forest Fτ formed from Ct. Remove all isolated vertices in H that correspond to components in Ct that have depots. Then no leaf in H corresponds to a component containing a depot.

Proof: This is a transcription of the proof, reproduced here for completeness using our notation in the specific domain of the Location Design and Routing Problem. Assume the contrary: Let v be a leaf, let Cv be its associated component containing a depot, let e be the edge incident to v, and let CV be the component of F which contains Cv. Let N and C-N be the two components formed by removing edge e from the edges of component C, Without loss of generality, say that CvN, The set N-Cv is partitioned by some of the components of the current round; call these C1, . . . , Ck. Since vertex v is a leaf, no edge in Fτ connects Cv to any Ci. Thus by the construction of Fτ, ∀i∈{1, . . . , k}: Ci contains at least one depot. Since Cv also contains at least one depot, it follows that N must too. Clearly, if two components S and B both contain depots and BS, then the component S-B must also contain a depot. Since we know that C contains a depot then N-C must as well, and thus by the construction of Fτ, e∉Fτ, which is a contradiction.

It has thus far been proven that Algorithm 1 produces a feasible solution to both IP and D in a logarithmic number of rounds. It therefore only remains to bound the quality of the solution. To prove that the algorithm is a 2-approximation, a technique of defining an invariant over the weights of the edges added to the forest that can ultimately be bounded by the average vertex degree of the forest is used. The basic intuition of the result is that the average degree of a vertex in a forest of at most n vertices is at most

2 - 2 n .

This technique is exactly the same as that first used in a proof due to Goemans and Williamson in the above-referenced article (Theorem 3.6), in which they show that certain connectivity problems can be sequentially 2-approximated in polynomial time. The present result in fact generalizes that of Goemans and Williamson by proving that, with a slight change to the potential function (and thereby the invariant), the approximation guarantee can be maintained even if multiple edges are added per round (allowing for parallelism/distribution), provided that the edges are mapped to a metric space such that the maximum weight is no greater than 150% of the minimum weight.

Proposition 4: The cost of the final spanning forest Fτ is bounded above by

( 2 - 2 R ) Z 1 P *

if the normalized edge weights are in the range

[ 1 , 3 2 ] .

Proof:

Without loss of generality, assume ys>0S∩T=, This property ensures that ΣS⊂V ys≦ZLP*. Since it is clear that ZLP*≦ZIP*, we then have

S V y S Z LP * Z IP * .

Proposition 3 ensures that the weight of Fτ is

e F w ( e ) e F S : e δ ( S ) ys = S V ys F τ δ ( S ) .

To prove this theorem we will show by induction over the construction of Fτ that

S V ys F τ δ ( S ) ( 2 - 2 R ) S V ys . ( 4 )

The base case certainly holds at round zero since all ys are initialized to zero. Let A be the set of edges added to the spanning forest during an arbitrary round t. For each edge e=u, v∈A, let ∈e denote the potential value associated with that edge: ∈e=w(e)−bt(u)−bt(v). Now sort A according to descending potential value, such that ei∈A is edge with the ith largest potential. At the end of a round t, the left-hand side of (8) will increase by at most

C C t : C T = y C F τ δ ( C ) = C C t : C T = ( u , v ) A : u C J t ( u , v ) ? 1 + J i ( v , u ) F τ δ ( C ) . ? indicates text missing or illegible when filed

If we can prove that this increase is bounded above by the increase of the right-hand side, namely

( 2 - 2 R ) i = 1 A e i × i , by lines 26 - 29 of Algorithm 1

then we will be done.
First, observe that (9) can be bounded above by
(maxe∈Ae) ΣC∈C,:C∩T=Σu,v)∈A:u∈C Jt(u, v)|Fτ∩δ(C)|. (5) Next, observe that (10) can be bounded below by

( min e A ε e ) ( 2 - 2 R ) A ( A 2 + 1 2 ) . ( 6 )

Now let H be the intersection graph of the final spanning forest Fτ formed from Ct. Remove all isolated vertices in H that correspond to components in Ct that contain at least one depot. Notice that H is a forest, and by Lemma 3 no leaf in H corresponds to a vertex with a depot. Let Na be the set of vertices in H that correspond to depot-less components:


Na={C∈Ct:C∩T=},

and let Ni be the set of vertices in H corresponding to components with depots. The degree of a vertex v in H corresponding to component C, denoted dv, must be |{e∈δ(C): e∈Fτ}|. Then the summation of (11) can be rewritten as

u N a d v = u N a N i d v - v · N i d v 2 ( N a + N i - 1 ) - 2 N i = ( 2 N a - 2 ) .

This inequality holds since H is a forest with at most |Na|+|Ni|−1 edges, and

As will be explained below, the parallel version of the algorithm can be trivially extended to a distributed algorithm.

Distributing the Algorithm

It is assumed that the communications network provides guaranteed delivery of messages; however, there may be arbitrary latency (i.e., the network is asynchronous). Without loss of generality, it is assumed that there is one intelligent agent per vertex in the graph. It is further assumed that all agents are honest and correct and thus need not consider the problem of Byzantine failure. The agents are non-adversarial insofar as their primary goal is to find a feasible solution to the location design and routing problem. The collective is therefore what is called a cooperative multi-agent system. Agents' perceptions of the graph being optimized (e.g., the network topology) are consistent, possibly through the use of a distributed consensus algorithm. Each agent/vertex has a unique identifier with a globally agreed ordering. This ordering can be used to construct a total ordering over the edges (e.g., by combining the unique identifiers of the incident vertices).

The proposed distributed algorithm is round-based, with each round corresponding to a single iteration of the main loop (line 9) of the parallel algorithm. The rounds proceed asynchronously between connected components. Therefore, as the connected components grow throughout the execution of the algorithm, the rounds naturally become synchronized.

The distributed version of the algorithm, given in Algorithm 2, uses simple synchronous message passing in place of the shared memory of the parallel algorithm. The distributed algorithm is proven deadlock-free in the following proposition:

Proposition 5: Algorithm 2 is deadlock-free.
Proof: The only blocking operations in the algorithm occur on lines 11, 14, 21, 26, and 34. Waiting for an Update message on line 11 will clearly not deadlock since UpdateRequest messages are sent on the line previous, and the procedure on line 35 immediately sends an Update message in reply to requests. Similarly, line 13 ensures that line 14 will not deadlock. The fact that the procedure on line 39 contains no blocking operations ensures that any Union message will be immediately replied with an Ack message. Therefore, line 21 will not deadlock. Any vertices that choose to make an incident edge tight will block on line 26 unless either the choice of edge was mutual or the connected component on the other end of the edge contains a depot. Let v, u be such an edge. Note that J(v, u)=1 and J(u, v)=0. In such a case, v will be added by u to I upon receipt of v's Union message on line 46. Now, by a similar argument to the proof of Lemma 2, it is noted that there must be some χ and y such that J+(u, y) and J(y, χ)=1 and either J(χ, y)=1 or χ's component already contains a depot (otherwise there would be a cycle). Therefore, u will not deadlock on line 26 and will eventually send an Adding message to v on line 28.

Finally, the main loop invariant on line 9 ensures that only depot-less components block on line 11. Furthermore, Equation 1 ensures that there must be exactly one vertex in each depot-less component that chooses to add exactly one edge during each round. Therefore, line 34 will not deadlock.

Algorithm 2 The distributed location design and routing algorithm.  1: procedure DISTRIBUTED-LOCATION-DESIGN(v, κ) Require: κ is the cost of opening a depot at v.  2: C ←  /* The other frontier vertices in our component, */  3: N ← δ({v })∪{ v ,dv } /* The neighborhood of v along with the   special depot vertex dv */  4: F ←  / * The spanning forest of our component, */  5: w (dv) ← κ  6: for all i ∈ δ(C) ∪{v} do  7:  b(i) ←   8: I ←   9: while F does not contain a depot do 10:  BROADCAST-MESSAGE(UpdateRequest) to all u ∈ N 11:  Block until we have received and handled all Update messages   from N. 12:  Find an edge e = v,u  ∈ N such that u ∉ C and ε = w(e) −   b(v) −b(u) is minimized. 13:  BROADCAST-MESSAGE(Potential ∈  ) to all c ∈ C 14:  Listen for all broadcast Potential messages from the frontier 15:  if ∈ is the smallest in the frontier and ties are broken in our favor   then 16:    N ← N − {u} 17:   if u = dv then 18:    Cm ←{u} 19:   else 20:    SEND-MESSAGE(Union e  ) to u 21:    Wait for an Ack (m, Cm) message from u 22:    if m = Mutual then /* u also chose to make edge e tight */ 23:      ε ε 2 24:    else 25:     if m = Not-Mutual then /* this means u does not yet have   a depot */ 26:      Block until we have received and handled an   Adding  ea a, Ca  message from u 27:     Cm ← Ca 28:    BROADCAST-MESSAGE(Adding e, ε, Cm  ) to all   c ∈C ∪ I 29:    I ←  30:    C← C ∪ Cm 31:    b(v) ← b(v) + ε 32:    F ← F∪{e} 33:   else 34:    Block until we have received and handled an Adding message   from another frontier member 35: procedure HANDLE-UPDATE-REQUEST-MESSAGE(UpdateRequest   sent by u) 36: SEND-MESSAGE(Update v1 b(v)  ) to u 37: procedure HANDLE-UPDATE-/MESSAGE(Update vu, bu  sent   by u) 38: b(vu) ← bu 39: procedure HANDLE-UNION-MESSAGE(Union (eu) sent by u) 40: if e = eu then 41:  SEND-MESSAGE(Ack Mutual, C  ) 42: else if F already contains a depot then 43:  SEND-MESSAGE(Ack Has-Depot,   ) 44: else 40: if e = eu then 41:  SEND-MESSAGE(Ack <Mutual,C>) 42: else if F already contains a depot then 43:  SEND-MESSAGE(Ack <Has-Depot, □>) 44: else 45:  SEND-MESSAGE(Ack<Not-Mutual, □>) 46:  I ← I U {u} 47: procedure HANDLE-ADD1NG-MESSAGE(Adding<ea, □a, Ca>) 48: F ← F U {ea} 49: b(v) ← b(v) + □a 50: C ← C U Ca

Assuming that all messages can be both unicast and broadcast in a constant number of messaging rounds then, by the same argument as in the proof of Equation 2, the main loop of the distributed algorithm on line 9 will run in a logarithmic number of iterations and thereby will have a logarithmic number of messaging rounds. If this assumption does not hold—for example, if ad hoc routing is required—then the algorithm can be trivially extended to support the BROADCAST-MESSAGE function itself. To do this, the algorithm will use the partially constructed spanning trees within each connected component for multicast.

The most expensive operations in the distributed algorithm are:

1. determining the frontier edge with minimal potential; and
2. merging two connected components once an edge between them becomes tight. Should efficient broadcast be unavailable, one way of implementing these operations is to have broadcast messages convergecasted up the partially constructed spanning tree in the component. The root of the tree (e.g., the vertex that was added the earliest and is of highest unique identifier) can then perform the operation and unicast the result back down to the relevant frontier member(s).

The distributed algorithm described herein for the location design and routing problem is guaranteed to run in a logarithmic number of communication rounds. Provided that the weight of the heaviest edge added in a round is no more than 150% of the lightest edge, the algorithm is guaranteed to produce a solution whose cost is no worse than two times optimal. This invariant can be maintained in general by embedding the true edge weights into

[ 1 , 3 2 ] .

Empirical results suggest that the algorithm as described herein will in fact produce 2-optimal solutions for arbitrary edge weight distributions. Ultimately, the algorithm furthers the results of Panconesi (mentioned herein) by showing that the primal/dual optimization scheme proposed in M. X. Goemans and D. P. Williamson, “A general approximation technique for constrained forest problems,” SIAM journal on Computing, vol. 24, pp. 296-317, 1995, can be successfully distributed into an algorithm with not only bounds on approximation, but also on runtime. This suggests that other connectivity problems might yield to the same approach.

Algorithm Implementation

FIG. 4 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the algorithms described above may be implemented. Although not required, the algorithms above may be implemented as computer-executable instructions, such as program modules, that are executed by a computer, such as a client workstation, server or personal computer, to implement methods of locating and routing-nodes, for example. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. Moreover, it should be appreciated that the invention and/or portions thereof may be practiced with other computer system configurations, including hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.

FIG. 4 is a block diagram representing a general purpose computer system in which aspects of the present invention may be incorporated. As shown, the exemplary general purpose computing system includes a conventional personal computer 120 or the like, including a processing unit 121, a system memory 122, and a system bus 123 that couples various system components including the system memory to the processing unit 121. The system bus 123 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read-only memory (ROM) 124 and random access memory (RAM) 125. A basic input/output system 126 (BIOS), containing the basic routines that help to transfer information between elements within the personal computer 120, such as during start-up, is stored in ROM 124.

The personal computer 120 may further include a hard disk drive 127 for reading from and writing to a hard disk (not shown), a magnetic disk drive 128 for reading from or writing to a removable magnetic disk 129, and an optical disk drive 130 for reading from or writing to a removable optical disk 131 such as a CD-ROM or other optical media. The hard disk drive 127, magnetic disk drive 128, and optical disk drive 130 are connected to the system bus 123 by a hard disk drive interface 132, a magnetic disk drive interface 133, and an optical drive interface 134, respectively. The drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 120.

Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 129, and a removable optical disk 131, it should be appreciated that other types of computer readable media which can store data that is accessible by a computer may also be used in the exemplary operating environment. Such other types of media include a magnetic cassette, a flash memory card, a digital video or versatile disk, a Bernoulli cartridge, a random access memory (RAM), a read-only memory (ROM), and the like.

A number of program modules may be stored on the hard disk, magnetic disk 129, optical disk 131, ROM 124 or RAM 125, including an operating system 135, one or more application programs 136, other program modules 137 and program data 138. A user may enter commands and information into the personal computer 120 through input devices such as a keyboard 140 and pointing device 142. Other input devices (not shown) may include a microphone, joystick, game pad, satellite disk, scanner, or the like. These and other input devices are often connected to the processing unit 121 through a serial port interface 146 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port, or universal serial bus (USB). A monitor 147 or other type of display device is also connected to the system bus 123 via an interface, such as a video adapter 148. In addition to the monitor 147, a personal computer typically includes other peripheral output devices (not shown), such as speakers and printers. The exemplary system of FIG. 4 also includes a host adapter 155, a Small Computer System Interface (SCSI) bus 156, and an external storage device 162 connected to the SCSI bus 156.

The personal computer 120 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 149. The remote computer 149 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 120, although only a memory storage device 150 has been illustrated in FIG. 4. The logical connections depicted in FIG. 4 include a local area network (LAN) 151 and a wide area network (WAN) 152. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet.

When used in a LAN networking environment, the personal computer 120 is connected to the LAN 151 through a network interface or adapter 153. When used in a WAN networking environment, the personal computer 120 typically includes a modem 154 or other means for establishing communications over the wide area network 152, such as the Internet. The modem 154, which may be internal or external, is connected to the system bus 123 via the serial port interface 146. In a networked environment, program modules depicted relative to the personal computer 120, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.

Computer 120 typically includes a variety of computer readable storage media. Computer readable storage media can be any available media that can be accessed by computer 120 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media include both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, Clash memory or other memory technology, CDROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 120. Combinations of any of the above should also be included within the scope of computer readable media that may be used to store source code for implementing the algorithms described above when such source code is executed by a processor.

The invention is not intended to be limited to the variations and examples specifically mentioned, and accordingly reference should be made to the appended claims to assess the spirit and scope of the invention in which exclusive rights are claimed.

Claims

1. A computer-implemented method of identifying nodes or distribution centers for distributing information or materials throughout a network or throughout a geographic area, comprising:

(a) starting with an empty forest of potential nodes or distribution centers of said network or said geographic area, the computer assigning each potential node or distribution center of the forest to be a member of its own connected component;
(b) for each potential node or distribution center that has not yet been assigned to be a node or distribution center, the computer adding a cut edge of a connected component to the forest and merging the cut edge with a potential node or distribution center on the other end of the cut edge;
(c) when a potential node or distribution center is merged with another potential node or distribution center that has been assigned to a node or distribution center, the computer assigning the same node or distribution center to the potential node or distribution center and stopping a resulting merged node from actively growing; and
(d) the computer repeating steps (a)-(c) until all potential nodes or distribution centers have been assigned to a node or distribution center.

2. The method of claim 1, wherein the computer proceeds asynchronously between respective connected components of the forest of potential nodes or distribution centers.

3. The method of claim 1, wherein the cut edges of the connected components have different weightings.

4. A computer system including a memory and a processor programmed by executable instructions to implement a method of identifying nodes or distribution centers for distributing information or materials throughout a network or throughout a geographic area, the executable instructions when processed by the processor implementing the steps of:

(a) starting with an empty forest of potential nodes or distribution centers of said network or said geographic area, assigning each potential node or distribution center of the forest to be a member of its own connected component;
(b) for each potential node or distribution center that has not yet been assigned to be a node or distribution center, adding a cut edge of a connected component to the forest and merging the cut edge with a potential node or distribution center on the other end of the cut edge;
(c) when a potential node or distribution center is merged with another potential node or distribution center that has been assigned to a node or distribution center, assigning the same node or distribution center to the potential node or distribution center and stopping a resulting merged node from actively growing; and
(d) repeating steps (a)-(c) until all potential nodes or distribution centers have been assigned to a node or distribution center.

5. The computer system of claim 4, wherein the processor is further programmed by executable instructions to proceed asynchronously between respective connected components of the forest of potential nodes or distribution centers.

6. The computer system of claim 4, wherein the cut edges of the connected components have different weightings.

7. A computer readable storage medium having executable instructions stored thereon that when executed by a processor cause said processor to implement a method of identifying nodes or distribution centers for distributing information or materials throughout a network or throughout a geographic area, the method comprising the steps of:

(a) starting with an empty forest of potential nodes or distribution centers of said network or said geographic area, assigning each potential node or distribution center of the forest to be a member of its own connected component;
(b) for each potential node or distribution center that has not yet been assigned to be a node or distribution center, adding a cut edge of a connected component to the forest and merging the cut edge with a potential node or distribution center on the other end of the cut edge;
(c) when a potential node or distribution center is merged with another potential node or distribution center that has been assigned to a node or distribution center, assigning the same node or distribution center to the potential node or distribution center and stopping a resulting merged node from actively growing; and
(d) repeating steps (a)-(c) until all potential nodes or distribution centers have been assigned to a node or distribution center.

8. The storage medium of claim 7, wherein the processor proceeds asynchronously between respective connected components of the forest of potential nodes or distribution centers.

9. The storage medium of claim 7, wherein the cut edges of the connected components have different weightings.

Patent History
Publication number: 20110246636
Type: Application
Filed: Mar 16, 2011
Publication Date: Oct 6, 2011
Applicant: DREXEL UNIVERSITY (Philadelphia, PA)
Inventors: William C. Regli (Philadelphia, PA), Ali Shokoufandeh (New Hope, PA), Evan Andrew Sultanik (Philadelphia, PA)
Application Number: 13/049,559
Classifications
Current U.S. Class: Computer Network Managing (709/223)
International Classification: G06F 15/173 (20060101);