iBGP and Constrained Connectivity

From MaRDI portal
Publication:3167390

DOI10.1007/978-3-642-32512-0_11zbMATH Open1372.68032arXiv1107.2299OpenAlexW1542787871MaRDI QIDQ3167390FDOQ3167390

Michael Dinitz, Gordon Wilfong

Publication date: 2 November 2012

Published in: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (Search for Journal in Brave)

Abstract: We initiate the theoretical study of the problem of minimizing the size of an iBGP overlay in an Autonomous System (AS) in the Internet subject to a natural notion of correctness derived from the standard "hot-potato" routing rules. For both natural versions of the problem (where we measure the size of an overlay by either the number of edges or the maximum degree) we prove that it is NP-hard to approximate to a factor better than Omega(logn) and provide approximation algorithms with ratio ildeO(sqrtn). In addition, we give a slightly worse ildeO(n2/3)-approximation based on primal-dual techniques that has the virtue of being both fast and good in practice, which we show via simulations on the actual topologies of five large Autonomous Systems. The main technique we use is a reduction to a new connectivity-based network design problem that we call Constrained Connectivity. In this problem we are given a graph G=(V,E), and for every pair of vertices u,vinV we are given a set S(u,v)subseteqV called the safe set of the pair. The goal is to find the smallest subgraph H of G in which every pair of vertices u,v is connected by a path contained in S(u,v). We show that the iBGP problem can be reduced to the special case of Constrained Connectivity where G=Kn and safe sets are defined geometrically based on the IGP distances in the AS. We also believe that Constrained Connectivity is an interesting problem in its own right, so provide stronger hardness results (2log1epsilonn-hardness of approximation) and integrality gaps (n1/3epsilon) for the general case. On the positive side, we show that Constrained Connectivity turns out to be much simpler for some interesting special cases other than iBGP: when safe sets are symmetric and hierarchical, we give a polynomial time algorithm that computes an optimal solution.


Full work available at URL: https://arxiv.org/abs/1107.2299




Recommendations




Cited In (2)





This page was built for publication: iBGP and Constrained Connectivity

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3167390)