SlideShare a Scribd company logo
Compactrouting
 In Routing schemes there is trade-off between the Routing table
size and stretch.
Stretch of path p(u; v) from node u to node v is defined as
|p(u; v) |/|d(u;v)| , where |d(u; v)| is the length of the
shortest u-v path.
 Naive Scheme : Each node holds the next hop to all nodes and
employs optimal routing
 Routing Table size is O(n log(n)) at each node
where n : number of nodes
 Stretch =1 ( optimum path)
By this Compact Routing Method
 Routing Table size bound - O(n2/3 log4/3 (n))
 Maximum stretch ≤ 3
 Nodes are connected with arbitrary weighted
undirected edges
 Reassign the node names in lexicographic
order, with bound O(log(n))
 Edges identified by port names, locally
relevant
 Concept of Landmark based routing
 Re-Labeling of nodes
 Storage in Routing Table
 Routing Procedure
 Every node name is represented as a
 Triplet –
( orig. node name, name of its landmark, edge from landmark to the
node)
eg . V <- (v, lv, elv(v)) where
elv(v) : is the edge from landmark to the node on shortest path,
lv : Landmark of v
 For each v ∈ V
lv argminl∈L d(l; v) //closest landmark to node v
 For each l ∈ L perform truncated-Dijkstra(nα )
 For each v ∈ VL
V <- (v; lv ; elv(v)) // the first link on the
shortest path from lv to v
 1) Extended Dominating Set – spans the
neighborhood of all nodes in the network,
obtained by Greedy Algorithm
 2) Nodes in neighborhood of maximum
nodes, selected as Landmark

V1
V2 V3
V4
V5
V6
V9
V7
V11
V10
V12
V8
 Find set D, the Extended Dominating Set, using Greedy Algorithm
(here α is a parameter s.t. 0<α <1)
Ǝ D ⊂ V such that
• |D| = O(n1-α log n)
• ∀ v ∈V , D ∩ Bv ≠ φ
Where Bv is the neighborhood of vertex ‘v’ of size nα
 Find set C, set of nodes which lie in neighbourhood of maximum nodes
C ⊂ V s.t. ∀ c ∈ C , |Rc| ≥ n(1+α)/2
 Set of Landmarks, L =D ∪ C
 For non-landmark nodes – information of
neighbour and all landmarks is stored .
 For landmarks - information of landmarks
only is stored , otherwise routing table is
huge at landmark
//For neighbours of node v
For each v ∈ V, perform truncated-Dijkstra(nα)
For each u reached from v:
If no landmark is on the path from v to u:
store(v, eu(v)) at u
// shortest paths from landmarks to every node
For each l ∈ L, perform full-Dijkstra(nα)
For each v ∈ V
Store (l, eu(l)) at u
V1
V2 V3
V4
V5
V6
V9
V7
V11
V10
V12
V8
NODE PORT
V2 1
V4 1
V3 2
V10 2
1
1
2
3
1
2
2
1
V3 4
….
4
1 2
3
neighbours
landmarks
At node u, a packet with destination (v; lv;elv(v))
is routed as –
 If u=lv (landmark)-> route along elv(v).
 If not, but (v; eu(v)) is in u's local routing table
-> route along eu(v).
 Else route along (lv ; eu(lv)).
 A set of landmarks (L) is |L|= O(n1-α log n + n(1+α)/2)
 If d(u; v) < d(lv ; v) then u is not a landmark and ∄
a landmark on the shortest path from u to v.
 For each v, lv is among v's n closest neighbors.
 For each x ≠ lv on the shortest path from lv to v,
(x; ex(v)) is stored at x.
 Let d(u; v) denote the length of the shortest
path from u to v. Then the routing algorithm
returns a path of length at most 3d(u; v).
 The local storage space used at each
node is O((n 1- α log n + n(1+α)/2) log n).
 Using α = 1/3 + (2 log log n)/(3 log n), we get the
bound for size as O(n2/3 log4/3 (n))
By Mikkel Thorup & Uri Zwick
 Suggests new routing for trees
 Improvement of Routing Table size
(in landmark based routing technique)
from O(n2/3 log4/3 (n)) to O(n1/2 log(n)) for stretch 3
 General Routing technique for Graphs
Stretch Table Size Handshaking?
3 O(n1/2) no
5 O(n1/3) yes
7 O(n1/3) no
2k-1 O(n1/k) yes
4k-5 O(kn1/k) no
New Routing Schemes
Authors Stretch Table Size
Cowen 3 O(n2/3)
Eilam,Gavoille 5 O(n1/2)
Awerbuch, Peleg O(k2) O(kn1/k)
Awerbuch O(k29k) O(kn1/k)
Previous Available Schemes
Each vertex is assigned a (1+o(1))log2n–bit
label.
Given label(u) and label(v), it is possible to
find, in constant time, the right edge to take
from u.
Similar result by Fraigniaud and Gavoille
[ICALP’01]
u
v
4 5 6
1
2
3 8
10
9
11
7
12
DFS Enumeration of Nodes
1
2
3
4
5 6
8
7
9
10
11
1-2
3-11
Stretch=1
RT=O(d log n)
Header= O(logn)
d= degree(node)
12
Single source shortest path routing:
 Root the tree arbitrarily
 Perform depth first enumeration of the vertices
 let fw be the largest descendent of w
 vertex v is descendent of w iff v ∈(w , fw)
 else is sent to parent of w using parent pointer of
w
 O(log2n)-bit labels.
Arbitrary port numbers.
DFS numbering:
For every vertex u, let fu
be the largest descendant of u. Then v is a
descendant of u iff 4
],[ ufuv
1
2 10
113
65
12
1413
7
98
10
7
A trivial solution with O(deg(v)) memory.
 Let s(v) be the number of descendants of v.
 Let pv be the parent of v. Then,
vertex v is heavy if s(v) s(pv)/2, and
light otherwise.
14
8 2
17
1 41
3
11
3
11
0
1
2
2
3
3
4
The light-level lv of a vertex v is the number of light vertices
on the path to it from the root.
Claim: lv<log2n
label(v)=(v,port(e1),port(e2),…)
At v we store:
(v, fv, hv, lv, port(v,pv) and port(v,hv))
e1
e2
e3
r
v
e4
 Each vertex ‘v’ assigned (1+O(1))log2n-bit label
 Label is the only information stored at the vertex
 Label serves as header attached to messages sent
to the vertex
 Routing decision takes constant time
 Weight sv of a vertex v is number of descendents in the tree
 A child v’ is said to be heavy if sv’>sv/b Else light
 Light level lv is def as the number of light vertices on the path
from r to v
 Enumerate tree in depth first order – where light vertices
visited before heavy children
 Routing information stored at v =(v,fv,hv,Hv,Pv) = O(b) words
 hv is the first heavy child of v
 Hv -> array of heavy children of v
 Pv ->array of port no to parent & heavy nodes
 < v0,v1,v2,….,vk> where v0=r and vi is the light nodes from r
to node v , vk=v
 LV=(port(vi1-1), port(vi2-1),……, port(vilv-1))= O(logbn)
 Label(v)=(v , Lv)
 At node w for header (v,Lv)
 If w=v – done
 Else if v ∈(w , fw) – if not not a descendent
forward to parent of w using Pv[0]
 Else if descendent check v ∈(hw , fw) – search
Hw and get corresponding Pw
 Else light descendent – search Lv[lw]
 Eg. b=2
 ((v>=w && v <h) ? L[1] : P[v>=h && v<=f])
Compactrouting
centA(v) = a center closest to v
clusterA(v) = vertices that are closer to v than to all centers.
cluster
Compactrouting
u vw
For any w on the shortest
path we have v clusterA(w).
u
v
centA(v)
),(3)),(())(,(
),(2))(,(
),()),((
vuvvcentvcentu
vuvcentu
vuvvcent
AA
A
A
Label(v)=
(v,centA(v),port(centA(v),v))
 We want A such that
 |A|=O(n1/2)
 clusterA(v)=O(n1/2), for every v
 [Cowen does this with O(n2/3)]
 Weight sv of a vertex v is the number of
descendants in the tree
 v’ is the heavy child & v0,v1,v2,….,vd-1 be its
light children in decreasing order of weight
 sv’>sv0>sv1>sv2>sv3>……>svd
 All the strings are concatenated and stored,
masking bits are to identify the lengths of
each string
 label(v)=(v,Lv,Mv)
 Header size =3.4logn
 Code(s)=s.bin(||s||,|s|).bin(||s||,||s||)
 Label(v)=ID(v) + RT(v)
 ID(v) consists of –
 Binary representation of i, the index of heavy
path containing v
 String s corresponding to v¯ =v
 ID(T; v) =ID(Tv ; v):code(i):code(sj ):code(port( v; v)) if v ≠ v,
code(i):code(sj ) otherwise
 Label(v) = code(ID(v)):code(RT(v)):code(pnt(v))
Algorithm center(G)
A ; W V;
While W
{
A A choose(W,n1/2);
W {w V | clusterA(w)>4n1/2 };
}
Return A;
The expected size of A is O(n1/2log n).
Improvement over Cowen’s landmark based
routing scheme
 Use a hierarchy of centers.
 Construct a tree cover
of the graph.
 Identify an appropriate tree from the cover and route on it.
Generalized routing scheme
Each vertex contained in at most n1/k trees.
For every u,v, there is a tree with a path of
stretch at most 2k-1 between them.
 Table size = O(n1/k)
 Label size = O(log n)
 No handshaking
???

More Related Content

PPT
Inroduction_To_Algorithms_Lect14
PPT
Bellman Ford's Algorithm
PDF
Longest common subsequence
PDF
Single source shortes path in dag
PPT
Bellman ford algorithm
PDF
Bellman ford
PDF
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
PPTX
Network flows
Inroduction_To_Algorithms_Lect14
Bellman Ford's Algorithm
Longest common subsequence
Single source shortes path in dag
Bellman ford algorithm
Bellman ford
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
Network flows

What's hot (19)

PDF
Time-Variant Distortions in OFDM
PPT
Paris Master Class 2011 - 06 Gpu Particle System
DOC
Solution a ph o 3
PDF
Ch39 ssm
PDF
Block Cipher vs. Stream Cipher
PDF
Bellmon Ford Algorithm
PDF
Advances in Directed Spanners
PPTX
Sub-Graph Centric Single Source Shortest Path
PPTX
Sound analysis and processing with MATLAB
PDF
Floyd warshall-algorithm
PPT
Lifting 1
PDF
Lecture set 5
PPT
noise removal in matlab
PDF
MLP輪読スパース8章 トレースノルム正則化
PDF
Topic modeling with Poisson factorization (2)
PDF
Poisson factorization
PDF
First order active rc sections hw1
PPTX
Fourier transforms of discrete signals (DSP) 5
PPT
Price of anarchy is independent of network topology
Time-Variant Distortions in OFDM
Paris Master Class 2011 - 06 Gpu Particle System
Solution a ph o 3
Ch39 ssm
Block Cipher vs. Stream Cipher
Bellmon Ford Algorithm
Advances in Directed Spanners
Sub-Graph Centric Single Source Shortest Path
Sound analysis and processing with MATLAB
Floyd warshall-algorithm
Lifting 1
Lecture set 5
noise removal in matlab
MLP輪読スパース8章 トレースノルム正則化
Topic modeling with Poisson factorization (2)
Poisson factorization
First order active rc sections hw1
Fourier transforms of discrete signals (DSP) 5
Price of anarchy is independent of network topology
Ad

Similar to Compactrouting (20)

PPTX
Thorup zwick compactrouting scheme
PPTX
Algorithm Exam Help
PPTX
DYNAMIC PROGRAMMING AND GREEDY TECHNIQUE
PPTX
Basic Graph Algorithms Vertex (Node): lk
PPT
Cowen2006 vrsn1
PPT
Greedy Algorithms Chapter for new students 4.ppt
PPTX
130210107039 2130702
PDF
14 chapter9 graph_algorithmstopologicalsort_shortestpath
PDF
Algorithms of graph
PPTX
Data structure and algorithm
PPTX
Graph Representation, DFS and BFS Presentation.pptx
PDF
Daa chpater 12
PPTX
Parallel Algorithms for Geometric Graph Problems (at Stanford)
PPT
Data Structures-Non Linear DataStructures-Graphs
PPTX
logic.pptx
PPTX
DATA STRUCTURES.pptx
PPT
bellman-ford Theorem.ppt
PDF
Algorithm chapter 9
PPTX
Ram minimum spanning tree
PPT
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Thorup zwick compactrouting scheme
Algorithm Exam Help
DYNAMIC PROGRAMMING AND GREEDY TECHNIQUE
Basic Graph Algorithms Vertex (Node): lk
Cowen2006 vrsn1
Greedy Algorithms Chapter for new students 4.ppt
130210107039 2130702
14 chapter9 graph_algorithmstopologicalsort_shortestpath
Algorithms of graph
Data structure and algorithm
Graph Representation, DFS and BFS Presentation.pptx
Daa chpater 12
Parallel Algorithms for Geometric Graph Problems (at Stanford)
Data Structures-Non Linear DataStructures-Graphs
logic.pptx
DATA STRUCTURES.pptx
bellman-ford Theorem.ppt
Algorithm chapter 9
Ram minimum spanning tree
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Ad

Recently uploaded (20)

PPTX
DMT - Profile Brief About Business .pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Hindu Circuler Economy - Model (Concept)
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
How to Get Funding for Your Trucking Business
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
How to Get Business Funding for Small Business Fast
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
DMT - Profile Brief About Business .pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Hindu Circuler Economy - Model (Concept)
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Business Ethics - An introduction and its overview.pptx
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Nidhal Samdaie CV - International Business Consultant
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
How to Get Funding for Your Trucking Business
Probability Distribution, binomial distribution, poisson distribution
2025 Product Deck V1.0.pptxCATALOGTCLCIA
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
NEW - FEES STRUCTURES (01-july-2024).pdf
How to Get Business Funding for Small Business Fast
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Comments on Crystal Cloud and Energy Star.pdf
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...

Compactrouting

  • 2.  In Routing schemes there is trade-off between the Routing table size and stretch. Stretch of path p(u; v) from node u to node v is defined as |p(u; v) |/|d(u;v)| , where |d(u; v)| is the length of the shortest u-v path.  Naive Scheme : Each node holds the next hop to all nodes and employs optimal routing  Routing Table size is O(n log(n)) at each node where n : number of nodes  Stretch =1 ( optimum path)
  • 3. By this Compact Routing Method  Routing Table size bound - O(n2/3 log4/3 (n))  Maximum stretch ≤ 3
  • 4.  Nodes are connected with arbitrary weighted undirected edges  Reassign the node names in lexicographic order, with bound O(log(n))  Edges identified by port names, locally relevant  Concept of Landmark based routing
  • 5.  Re-Labeling of nodes  Storage in Routing Table  Routing Procedure
  • 6.  Every node name is represented as a  Triplet – ( orig. node name, name of its landmark, edge from landmark to the node) eg . V <- (v, lv, elv(v)) where elv(v) : is the edge from landmark to the node on shortest path, lv : Landmark of v
  • 7.  For each v ∈ V lv argminl∈L d(l; v) //closest landmark to node v  For each l ∈ L perform truncated-Dijkstra(nα )  For each v ∈ VL V <- (v; lv ; elv(v)) // the first link on the shortest path from lv to v
  • 8.  1) Extended Dominating Set – spans the neighborhood of all nodes in the network, obtained by Greedy Algorithm  2) Nodes in neighborhood of maximum nodes, selected as Landmark
  • 10.  Find set D, the Extended Dominating Set, using Greedy Algorithm (here α is a parameter s.t. 0<α <1) Ǝ D ⊂ V such that • |D| = O(n1-α log n) • ∀ v ∈V , D ∩ Bv ≠ φ Where Bv is the neighborhood of vertex ‘v’ of size nα  Find set C, set of nodes which lie in neighbourhood of maximum nodes C ⊂ V s.t. ∀ c ∈ C , |Rc| ≥ n(1+α)/2  Set of Landmarks, L =D ∪ C
  • 11.  For non-landmark nodes – information of neighbour and all landmarks is stored .  For landmarks - information of landmarks only is stored , otherwise routing table is huge at landmark
  • 12. //For neighbours of node v For each v ∈ V, perform truncated-Dijkstra(nα) For each u reached from v: If no landmark is on the path from v to u: store(v, eu(v)) at u // shortest paths from landmarks to every node For each l ∈ L, perform full-Dijkstra(nα) For each v ∈ V Store (l, eu(l)) at u
  • 13. V1 V2 V3 V4 V5 V6 V9 V7 V11 V10 V12 V8 NODE PORT V2 1 V4 1 V3 2 V10 2 1 1 2 3 1 2 2 1 V3 4 …. 4 1 2 3 neighbours landmarks
  • 14. At node u, a packet with destination (v; lv;elv(v)) is routed as –  If u=lv (landmark)-> route along elv(v).  If not, but (v; eu(v)) is in u's local routing table -> route along eu(v).  Else route along (lv ; eu(lv)).
  • 15.  A set of landmarks (L) is |L|= O(n1-α log n + n(1+α)/2)  If d(u; v) < d(lv ; v) then u is not a landmark and ∄ a landmark on the shortest path from u to v.  For each v, lv is among v's n closest neighbors.  For each x ≠ lv on the shortest path from lv to v, (x; ex(v)) is stored at x.
  • 16.  Let d(u; v) denote the length of the shortest path from u to v. Then the routing algorithm returns a path of length at most 3d(u; v).  The local storage space used at each node is O((n 1- α log n + n(1+α)/2) log n).  Using α = 1/3 + (2 log log n)/(3 log n), we get the bound for size as O(n2/3 log4/3 (n))
  • 17. By Mikkel Thorup & Uri Zwick
  • 18.  Suggests new routing for trees  Improvement of Routing Table size (in landmark based routing technique) from O(n2/3 log4/3 (n)) to O(n1/2 log(n)) for stretch 3  General Routing technique for Graphs
  • 19. Stretch Table Size Handshaking? 3 O(n1/2) no 5 O(n1/3) yes 7 O(n1/3) no 2k-1 O(n1/k) yes 4k-5 O(kn1/k) no New Routing Schemes Authors Stretch Table Size Cowen 3 O(n2/3) Eilam,Gavoille 5 O(n1/2) Awerbuch, Peleg O(k2) O(kn1/k) Awerbuch O(k29k) O(kn1/k) Previous Available Schemes
  • 20. Each vertex is assigned a (1+o(1))log2n–bit label. Given label(u) and label(v), it is possible to find, in constant time, the right edge to take from u. Similar result by Fraigniaud and Gavoille [ICALP’01] u v
  • 21. 4 5 6 1 2 3 8 10 9 11 7 12 DFS Enumeration of Nodes
  • 22. 1 2 3 4 5 6 8 7 9 10 11 1-2 3-11 Stretch=1 RT=O(d log n) Header= O(logn) d= degree(node) 12
  • 23. Single source shortest path routing:
  • 24.  Root the tree arbitrarily  Perform depth first enumeration of the vertices  let fw be the largest descendent of w  vertex v is descendent of w iff v ∈(w , fw)  else is sent to parent of w using parent pointer of w
  • 25.  O(log2n)-bit labels. Arbitrary port numbers. DFS numbering: For every vertex u, let fu be the largest descendant of u. Then v is a descendant of u iff 4 ],[ ufuv 1 2 10 113 65 12 1413 7 98 10 7 A trivial solution with O(deg(v)) memory.
  • 26.  Let s(v) be the number of descendants of v.  Let pv be the parent of v. Then, vertex v is heavy if s(v) s(pv)/2, and light otherwise. 14 8 2 17 1 41 3 11 3 11
  • 27. 0 1 2 2 3 3 4 The light-level lv of a vertex v is the number of light vertices on the path to it from the root. Claim: lv<log2n label(v)=(v,port(e1),port(e2),…) At v we store: (v, fv, hv, lv, port(v,pv) and port(v,hv)) e1 e2 e3 r v e4
  • 28.  Each vertex ‘v’ assigned (1+O(1))log2n-bit label  Label is the only information stored at the vertex  Label serves as header attached to messages sent to the vertex  Routing decision takes constant time
  • 29.  Weight sv of a vertex v is number of descendents in the tree  A child v’ is said to be heavy if sv’>sv/b Else light  Light level lv is def as the number of light vertices on the path from r to v  Enumerate tree in depth first order – where light vertices visited before heavy children  Routing information stored at v =(v,fv,hv,Hv,Pv) = O(b) words  hv is the first heavy child of v  Hv -> array of heavy children of v  Pv ->array of port no to parent & heavy nodes  < v0,v1,v2,….,vk> where v0=r and vi is the light nodes from r to node v , vk=v  LV=(port(vi1-1), port(vi2-1),……, port(vilv-1))= O(logbn)
  • 30.  Label(v)=(v , Lv)  At node w for header (v,Lv)  If w=v – done  Else if v ∈(w , fw) – if not not a descendent forward to parent of w using Pv[0]  Else if descendent check v ∈(hw , fw) – search Hw and get corresponding Pw  Else light descendent – search Lv[lw]  Eg. b=2  ((v>=w && v <h) ? L[1] : P[v>=h && v<=f])
  • 32. centA(v) = a center closest to v
  • 33. clusterA(v) = vertices that are closer to v than to all centers. cluster
  • 35. u vw For any w on the shortest path we have v clusterA(w).
  • 37.  We want A such that  |A|=O(n1/2)  clusterA(v)=O(n1/2), for every v  [Cowen does this with O(n2/3)]
  • 38.  Weight sv of a vertex v is the number of descendants in the tree  v’ is the heavy child & v0,v1,v2,….,vd-1 be its light children in decreasing order of weight  sv’>sv0>sv1>sv2>sv3>……>svd  All the strings are concatenated and stored, masking bits are to identify the lengths of each string  label(v)=(v,Lv,Mv)  Header size =3.4logn
  • 39.  Code(s)=s.bin(||s||,|s|).bin(||s||,||s||)  Label(v)=ID(v) + RT(v)  ID(v) consists of –  Binary representation of i, the index of heavy path containing v  String s corresponding to v¯ =v  ID(T; v) =ID(Tv ; v):code(i):code(sj ):code(port( v; v)) if v ≠ v, code(i):code(sj ) otherwise  Label(v) = code(ID(v)):code(RT(v)):code(pnt(v))
  • 40. Algorithm center(G) A ; W V; While W { A A choose(W,n1/2); W {w V | clusterA(w)>4n1/2 }; } Return A; The expected size of A is O(n1/2log n). Improvement over Cowen’s landmark based routing scheme
  • 41.  Use a hierarchy of centers.  Construct a tree cover of the graph.  Identify an appropriate tree from the cover and route on it. Generalized routing scheme
  • 42. Each vertex contained in at most n1/k trees. For every u,v, there is a tree with a path of stretch at most 2k-1 between them.
  • 43.  Table size = O(n1/k)  Label size = O(log n)  No handshaking ???