TSDLMRA: an efficient multicast routing algorithm based on Tabu search
-
Upload
independent -
Category
Documents
-
view
1 -
download
0
Transcript of TSDLMRA: an efficient multicast routing algorithm based on Tabu search
TSDLMRA: an efficient multicast routing algorithm
based on Tabu search
Heng Wang*, Jie Fang, Hua Wang, Ya-Min Sun
Department of Computer Science and Technology, Nanjing University of Science and Technology,
608 Staff Room, Nanjing 210094, China
Received 17 June 2003; received in revised form 24 September 2003; accepted 2 October 2003
Abstract
As a NP-Complete problem, multicast routing with delay constraint is a research difficulty in
routing problem. Tabu Search is artificial intelligence algorithm, which is an extension of local
search algorithm and has simple realization and well properties. In this paper, an efficient algorithm
based on Tabu Search for Delay-Constrained Low-Cost Multicast Routing is proposed to solve
delay-constrained multicast routing problem. This problem is known to be NP-Complete. The
proposed heuristic algorithm makes use of the characteristics of flexible memory function and tabu
rule in TS algorithm, generates neighborhood structure base on ‘paths-switching’ operations, and
finds multicast tree satisfying constraint. A large number of simulations demonstrate that the
algorithm performs excellent performance of cost, rapid convergence and stable performance of
delay.
q 2003 Elsevier Ltd. All rights reserved.
Keywords: Multicast routing; Tabu search; Delay constrained; Constrained Steiner tree; NP-Complete
1. Introduction
Distributed real-time applications, such as audio- and video-conferencing, collabora-
tive environments and distributed interactive simulation, by and large, involve a source
sending messages to a selected set of destinations with varying Quality-of-Service (QoS)
delivery constraints. This requires the underlying network to provide multicasting and
QoS capabilities to efficiently support these applications. At the routing level, these
1084-8045/$ - see front matter q 2003 Elsevier Ltd. All rights reserved.
doi:10.1016/j.jnca.2003.10.001
Journal of Network and
Computer Applications 27 (2004) 77–90
www.elsevier.com/locate/jnca
* Corresponding author. Tel.: þ86-25-4315660; fax: þ86-25-4315636.
E-mail addresses: [email protected] (H. Wang), [email protected] (J. Fang),
[email protected] (H. Wang), [email protected] (Y.M. Sun).
requirements are translated into the problem of determining a multicast tree, usually
rooted at the source node and spanning the set of receiver (destination) nodes. The QoS
constraints typically impose a restriction on the acceptable multicast trees.
With the advent of the real-time interactive applications, minimizing delay of the
multicast tree is also an important objective along with minimizing cost. Therefore, both
cost optimization and delay optimization goals are important for the multicast routing tree
construction. The problem of minim izing tree cost under the constrained that all path
delays are within a user-specified delay bound is referred to as the delay constraint
multicast routing problem. This problem is formalized into constrained Steiner tree
problem, which is known to be NP-Complete.
We briefly discuss some recently proposed delay-constrained Steiner tree heuristics.
KPP (Kompella et al., 1993) is the first heuristic algorithm for delay-constrained Steiner
tree problem. KPP extends KMB (Kou et al., 1981), an unconstrained Steiner tree
heuristic, to compute delay-bounded paths assuming the delay bound and link delays are
all integers. Then KPP converts the original network graph into a closure graph connecting
multicast group members. KPP uses Prim’s algorithm (Cormen et al., 2001) to obtain a
minimum spanning tree of the closure graph. Finally, KPP replaces the edges in the
minimum spanning tree with paths in the original graph. The time complexity of KPP is
OðDlV l3Þ: Zhu et al. (1995) proposed another delay constrained Steiner tree heuristic
algorithm, called BSMA. The algorithm starts by computing a least delay tree (LDT)
rooted at a given source and spanning all the group members. It then iteratively replaces
superedges in the tree with cheaper superedges not in the tree while not violating the delay
constraint, until the total cost of the tree cannot be further reduced. Cheaper superedges are
located by using a Kth shortest path algorithm. The time complexity for BSMA is
OðKlV l3log lV lÞ; where K may be very large in case of large, densely connected networks,
and it may be difficult to achieve acceptable running times (Salama et al., 1997).
As an extension of local neighborhood search, Tabu Search (TS) has been successful in
a variety of problem settings like scheduling, transportation, layout and circuit design, and
graphs (Wang, 2001). Procedures based on TS explores the search space by moving from a
solution to its best neighbor (the one with the best objective value among all examined
candidates), even if this results in a deterioration of the objective function value, in order
to increase the likelihood of escaping from a poor local optimum.
In this paper, we propose an efficient algorithm based on TS for generating a low-cost
multicast tree subject to delay constraints. We call this algorithm Tabu Search for Delay-
Constrained Low-Cost Multicast Routing (TSDLMRA). The algorithm starts with an
initial shortest path tree constructed by using Zhang and Mouftah’s DDSP algorithm
(Zhang and Mouftah, 2002). Then algorithm constructs a backup-paths-set for each
destination using Kth shortest path algorithm, and generates neighborhood structure by
‘paths-switching’ operation. For those trees that violate delay constraint, we assign an
extra penalty by increasing their cost, so that final solutions are feasible. Simulation results
show our algorithm has features of well performance of cost, fast convergence and stable
delay. TSDLMRA belongs to source-based routing algorithm, because it assumes that
sufficient global information is available to the source.
The rest of the paper is organized as follows. In Section 2, delay-constrained low-cost
multicast routing problem is formulated. Section 3 introduces briefly TS method.
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9078
The proposed algorithm is described in Section 4. The complexity analysis of TSDLMRA
is introduced in Section 5. Simulation results and comparison with other reported
heuristics are presented in Section 6. Section 7 concludes the paper.
2. The delay-constrained multicast routing problem
The communication network is modeled as a undirected graph G ¼ ðV ;EÞ; where V
denotes the set of nodes and E is the set of edges (links) representing physical connectivity
between nodes. Any link e [ E has a cost cðeÞ : E ! Rþ and a delay dðeÞ : E ! Rþ
associated with it. The function cð·Þ represents the utilization of the link and the function
dð·Þ represents the delay that the packet experiences on link including queuing,
transmission, and propagation delay. Let s [ V be a source node and M # V 2 {s} be
the set of destination nodes, called the multicast group. A multicast tree TðT # GÞ is a tree
rooted at s and spanning all members of M: Assume that pðu; vÞ represents the path from u
to v, then there exist following relationships in multicast tree T :
delayðpðs;mÞÞ ¼X
e[pðs;mÞ
dðeÞ; m [ M ð1Þ
costðTÞ ¼X
e[T
cðeÞ ð2Þ
delayðTÞ ¼ maxm[M
ðdelayðpðs;mÞÞÞ ð3Þ
Given these definitions, we can formally present the delay-constrained multicast
routing problem as follows:
Definition 1. Delay-constrained low-cost multicast routing problem. Given a network
G ¼ ðV ;EÞ; a source node s; destination node set M; a link delay function dð·Þ; a link cost
function cð·Þ; and a positive delay constraint D; the objective of the delay-constrained low-
cost multicast routing problem is to construct a multicast tree TðVT ;ET Þ such that the delay
constraint is satisfied, i.e.
delayðTÞ # D ð4Þ
and that the tree cost costðTÞ is minimized.
3. Tabu search method
TS was introduced by Glover as a general iterative metaheuristic for solving
combinatorial optimization problems (Wang, 2001). TS is conceptually simple and
elegant. It is a form of local neighborhood search. Each solution x [ V has an associated
set of neighbors NðxÞ; where V is the set of feasible solutions. A solution x0 [ NðxÞ can be
reached from x by an operation called a move to x0: TS moves from a solution to its best
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 79
admissible neighbor, even if this causes the objective function to deteriorate. To avoid
cycling in the course of the search, the reverses of the last certain number of moves,
formed as a tabu list, are forbidden or declared as tabu restricted for certain number of
iterations. To prevent a too strict setting the tabu restriction, aspiration criteria are usually
introduced to override the tabu restriction and thereby to lead the search to a promising
region of the solution space. Intensification and diversification strategies are used to
improve the search. The general TS algorithm is given as follows.
Step 1. Start with an initial solution xnow; and initialize tabu list H ¼ B;
Step 2. If satisfy termination rule, then procedure stop; otherwise, generate candidate
solution set Can_NðxnowÞ satisfied tabu restriction in xnow’s neighbors NðxnowÞ; find a
best solution xnext in Can_NðxnowÞ; xnow U xnext; update tabu list H; repeat Step 2.
4. Delay-constrained low-cost multicast routing algorithm based on tabu search
4.1. Encoding and initial solution
In TSDLMRA, a solution is encoded as an array of lMl elements, where each element is
a path from source s to destination node m [ M in multicast tree T ; i.e. x ¼ ðp1; p2;…; pkÞ;
where k ¼ lMl; pi ¼ pðs;miÞ; mi [ M; 1 # i # k:
The initial solution T0 is a shortest path tree, which is constructed by using DDSP
algorithm (Zhang and Mouftah, 2002). DDSP algorithm aims to construct a low-cost SPT
by considering link sharing between different destinations, and can be seen as an extension
of Dijkstra’s shortest path algorithm (Cormen et al., 2001). DDSP algorithm integrates the
destination-driven characteristics of Shaikh and Shin’s DDMC algorithm (Shaikh and
Shin, 1997) and the shortest path characteristics of SPT, so it outperforms SPT in terms of
cost performance.
A ‘best soulution so far’ Tbest is memorized during the whole procedure. If T0 satisfies
the delay constraint, then initial Tbest is T0; otherwise Tbest is a LDT rooted at source by
using Dijkstra algorithm. If a LDT’s delay violates the delay constraint, then algorithm
returns.
For ease of presentation, we consider an example network as shown in Fig. 1(a), where
s ¼ {A} and M ¼ {B;C;D;E}; the numbers in the parentheses along each edge represent
the cost and delay for that edge. Given delay constraint D ¼ 7: The initial solution T0 and
the initial best solution Tbest are shown, respectively, in Fig. 1(b) and (c). Tbest is a LDT
because of its violating delay constraint. The encoding for T0 and Tbest are given in Table 1.
4.2. Evaluation function
The evaluation function is used for evaluating state of search, in our algorithm, we take
objective function as evaluation function, i.e. f ðxÞ ¼ costðxÞ:
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9080
Fig
.1
.E
xam
ple
net
work
,in
itia
lso
luti
on
T0
and
init
ial
bes
tso
luti
on
Tb
est:
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 81
4.3. Backup-paths-set
For each destination node m [ M; we compute least-cost paths from s to m by using
Kth shortest path algorithm to construct a backup-paths-set for generating neighbors. Let
Pi be paths set for destination node i; then
Pi ¼ {p1i ;…; p
ji;…; pK
i } ð5Þ
where pji is the jth path for destination node i: Table 2 shows backup-paths-set from source
A to destination nodes in example network.
4.4. Neighborhood structure
For generating neighbors, we choose a neighborhood structure based on ‘paths-
switching’ operations. We randomly select a destination node m [ M; and delete the path
from source s to m in current solution Tnow; then generate different neighbor solutions by
selecting other paths from s to m in backup-paths-set. Each iteration begins by generating
neighbor solutions NðTnowÞ corresponding to Tnow; and the size of neighbor set is dynamic
in our algorithm. For Tbest in Fig. 1(c), we assume that destination node B is selected and
path from A to B is deleted, then we select other paths from Table 2 to construct new
neighbors. The two neighbors of Tbest are shown in Fig. 2 and are encoded in Table 3.
Among the neighbors, the one with the best cost is selected, and considered as new
current solution for the next iteration. The ‘paths-switching’ fails to consider delay
constraint, so it might happen the some of the trees violate delay constraint. In that case,
we assign an extra penalty by increasing its cost, so that it is less likely to be accepted in
the candidate list as shown in the tree of Fig. 2(b). Obviously, the new multicast tree of
Fig. 2(a) is selected for the next iteration and considered as new current solution.
Table 1
The encoding for T0 and Tbest
0 1 2 3 Delay Cost
T0 A;F;D;B A;F;C A;F;D A;F;D;B;E 8 5
Tbest A;H;E;B A;F;D;C A;F;D A;H;E 5 10
Table 2
The backup-paths-set of example network, K ¼ 5
Destination 1 2 3 4 5
B A;F;D;B A;F;C;B A;H;G;B A;F;C;E;B A;F;C;D;B
C A;F;C A;F;D;C A;F;D;B;C A;F;D;B;E;C A;H;E;C
D A;F;D A;F;C;D A;F;C;B;D A;F;C;E;B;D A;H;G;B;D
E A;F;C;E A;F;D;B;E A;F;C;B;E A;H;E A;F;D;C;E
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9082
4.5. Tabu list and tabu length
To avoid local minimum, a tabu list is constructed where forbidden moves are listed.
This list contains information that to some extent forbids the search from returning to a
previously visited solution. In our algorithm, a multicast tree is considered as an element
of tabu list, and the tabu length is set to 9.
4.6. Aspiration criterion
While central to TS, tabus are sometimes too powerful: they may prohibit attractive
moves, even when there is no danger of cycling, or they may lead to an overall stagnation
of the searching process. It is thus necessary to use algorithmic devices that will allow one
to revoke (cancel) tabus. These are called aspiration criteria. The simplest and most
commonly used aspiration criterion consists in allowing a move, even if it is tabu, if it
results in a solution with an objective value better than that of the current best-known
solution (since the new solution has obviously not been previously visited). So, if the cost
of a tabu candidate solution is better than Tbest’s, then it is considered as new current
solution, and Tbest is updated at once.
4.7. Termination rule
We use a fixed iteration number as stopping criterion, and maximum iteration
number is 100.
Fig. 2. Two neighbors from Tbest:
Table 3
The encoding for neighbors of Tbest
0 1 2 3 Delay Cost
(a) A;F;D;B A;F;D;C A;F;D A;H;E 6 10
(b) A;H;G;B A;F;D;C A;F;D A;H;E 8 12 þ penalty
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 83
The pseudo code of our TSDLMRA algorithm is given in Fig. 3. Steps 1–11 show the
initialization phase. Steps 12–26 show the iteration phase.
5. The complexity analysis
Theorem 1. The time complexity of TSDLMRA is OðKmn3Þ; where m is group size and n is
network size.
Fig. 3. The pseudo code for TSDLMRA.
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9084
Proof. In the initialization phase, the time complexity of generating LDT by using Dijkstra
and initial solution by using DDSP are both Oðn2Þ: The time complexity of constructing
backup-paths-set by using Kth shortest path algorithm is OðKmn3Þ: One iteration costs
OðKÞ; thus, for Q iterations, the cost becomes OðQKÞ: So the worst time complexity of our
algorithm is Oðn2 þ n2 þ Kmn3 þ QKÞ: The term QK is usually much smaller than Kmn3;
so the time complexity of TSDLMRA is OðKmn3Þ: A
6. Simulation results
To evaluate the efficiency of TSDLMRA algorithm, we use the random link
generator developed by Salama (1996), which yields networks with an average node
degree of 4–6. The positions of the nodes are fixed in a rectangle of size
4000 £ 2400 km2, and the capacity of each link is 155 Mbps. The Euclidean metric
is then used to determine the distance between each pair of nodes. Edges are introduced
between pairs of nodes u; v with a probability that depends on the distance between
them. The edge probability is given by Pðu; vÞ ¼ b expð2dðu; vÞ=aLÞ; where dðu; vÞ is
the distance from node u to v; L is the maximum distance between two nodes. a and b
are parameters, and are set to 0.15 and 2.2, respectively. Larger values of b result in
graphs with higher edge densities, while small values of a increase the density of short
edges relative to longer ones.
The link delay function dðeÞ is defined as the propagation delay of the link, and queuing
and transmission delays are negligible. The propagation speed through the links is taken to
be two third the speed of light. The link cost function cðeÞ is defined as the current total
bandwidth reserved on the link, which is random variable uniformly distributed between
10 and 120 Mbps.
In the first set of experiments, TSDLMRA is compared with KPP, BSMA and LD
for cost performance. Fig. 4 shows the tree cost for varying network size with the
group size ¼ 5; average node degree of network ¼ 4; and D ¼ 40 and 60 ms,
respectively. It can be seen from Fig. 4 that our algorithm has a better cost
performance than the compared algorithms. Fig. 5 shows the cost performance
measures versus group size for a 50-node network and node degree of 4, delay
constraint of 40 and 60 ms. As the group size increases, the tree cost of all algorithms
grow. Fig. 6 shows the performance of different heuristics for varying delay bound, for
a 50-node network and a group size of 5. In general, TSDLMRA has best cost
performance among all algorithms.
In the second set of experiments, we observe the delay of tree that comes from applying
for TSDLMRA and LD algorithm versus varying network size for a group size of 5 nodes,
with node degree of 4. We can see from Fig. 7 that the delay of tree generated using by our
algorithm always maintains at 24 ms as network size increases whether delay constraint is
so stringent or not.
In the third set of experiments, TSDLMRA is compared with other two algorithms
(Wang and Wang, 2002; Shi et al., 2000) based on genetic algorithms for convergence
performance. We call the algorithm in (Wang and Wang, 2002) WGA, and the
algorithm in (Shi et al., 2000) SGA. Fig. 8 shows the best solutions for example
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 85
network in Fig. 1(a) when delay constraint is 6 and 7, respectively, and their cost is 7
and 6, respectively. Fig. 9 shows the tree cost for varying iteration number. In Fig. 9(a),
WGA and SGA’s iteration number is 89 and 107, respectively, for getting best solution
when D ¼ 6; and our algorithm converges just within 10 steps. Fig. 9(b) shows that
WGA and SGA’s iteration number is 220 and 405, respectively, for D ¼ 7; and
TSDLMRA converges still within 10 steps.
Fig. 4. Tree cost versus network size for group size ¼ 5; node degree ¼ 4:
Fig. 5. Tree cost versus group size for network size ¼ 50; node degree ¼ 4:
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9086
Finally, we track the cost of the best solution over time. Fig. 10 shows cost of best
solution found by TSDLMRA versus iteration number for 90-, 60- and 30-node
networks with group size ¼ 5; D ¼ 60 ms and node degree ¼ 4: As is clear, the
algorithm converges quickly, which satisfies the real-time requirement of multimedia
network.
Fig. 6. Tree cost versus delay constraint for network size ¼ 50; group size ¼ 5:
Fig. 7. Tree delay versus network size for group size ¼ 5; node degree ¼ 4:
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 87
Fig. 9. Tree cost versus iteration number for example network.
Fig. 8. The best solution for example network when delay constraint is 6 and 7, respectively.
Fig. 10. Cost of best solution found by TSDLMRA versus iteration number for three networks. Group size ¼ 5;
delay constraint D ¼ 60 ms; node degree ¼ 4:
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9088
7. Conclusion
In this paper, we presented an efficient algorithm based on TS for obtaining delay-
constrained low-cost multicast trees. The proposed TSDLMRA algorithm has following
features: (1) the time complexity is low, i.e. OðKmn3Þ; (2) it was always able to find a
multicast tree if one exists; (3) simulation results show that TSDLMRA performs
excellent performance of cost, rapid convergence and stability of delay.
References
Cormen TH, Leiserson CE, Riverst RL, Stein C. Introduction to algorithms, 2nd ed. Cambridge, MA/New York:
MIT Press/McGraw-Hill; 2001.
Kompella VP, Pasquale JC, Polyzos GC. Multicasting routing for multimedia communication. IEEE/ACM Trans
Network 1993;1(3):286–92.
Kou L, Markowsky G, Berman L. A fast algorithm for Steiner trees in graphs. Acta Informatica 1981;15(2):141–5.
Salama HF. Multicast routing for real-time communication on high-speed networks. PhD Thesis. North Carolina
State University, Department of Electrical and Computer Engineering; 1996.
Salama HF, Reeves DS, Viniotis Y. Evaluation of multicast routing algorithms for real-time communication on
high-speed networks. IEEE J Sel Areas Commun 1997;15(3):332–45.
Shaikh A, Shin KG. Destination-driven routing for low-cost multicast. IEEE J Sel Areas Commun 1997;15(3):
373–81.
Shi J, Zou L, Dong T-L. The application of genetic algorithm in multicast routing. Acta Electron Sin 2000;28(5):
88–9.
Wang L. Intelligent optimization algorithms with applications. Beijing/Heidelberg: Tsinghua University Press/
Springer; 2001.
Wang X-H, Wang G-X. A multicast routing approach with delay-constrained minimum-cost based on genetic
algorithm. J China Inst Commun 2002;23(3):112–7.
Zhang B, Mouftah HT. A destination-driven shortest path tree algorithm. Proceedings of the IEEE International
Conference on Communications 2002 (ICC’2002), New York, vol. 4. IEEE Communication Society; 2002. p.
2258–62.
Zhu Q, Parsa M, Garcia-Luna-Aceves JJ. A source-based algorithm for delay-constrained mimimum-cost
multicasting. Proceedings of IEEE INFOCOM’95, Boston, MA 1995;452–8.
Heng Wang is currently a PhD candidate at Nanjing University of Science and
Technology. He received his BE from Department of Computer Science and
Engineering, Nanjing University of Science and Technology, China in 1999. His
research interests include QoS routing algorithm and multicast routing with QoS
constraint.
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–90 89
Jie Fang is currently a Master student at Nanjing University of Science and
Technology, her research interests include QoS routing algorithm.
Hua Wang is currently a PhD candidate at Nanjing University of Science and
Technology, his research interests include MPLS traffic engineering and QoS
routing.
Ya-Min Sun is professor and PhD supervisor. His current research interests are computer network and
communications.
H. Wang et al. / Journal of Network and Computer Applications 27 (2004) 77–9090