-
The Power of Alternatives in Network Embedding
Authors:
Oleg Kolosov,
Gala Yadgar,
David Breitgand,
Dean H. Lorenz
Abstract:
In the virtual network embedding problem, the goal is to map embed a set of virtual network instances to a given physical network substrate at minimal cost, while respecting the capacity constraints of the physical network. This NP-hard problem is fundamental to network virtualization, embodying essential properties of resource allocation problems faced by service providers in the edge-to-cloud sp…
▽ More
In the virtual network embedding problem, the goal is to map embed a set of virtual network instances to a given physical network substrate at minimal cost, while respecting the capacity constraints of the physical network. This NP-hard problem is fundamental to network virtualization, embodying essential properties of resource allocation problems faced by service providers in the edge-to-cloud spectrum. Due to its centrality, this problem and its variants have been extensively studied and remain in the focus of the research community.
In this paper, we present a new variant, the virtual network embedding with alternatives problem (VNEAP). This new problem captures the power of a common network virtualization practice, in which virtual network topologies are malleable - embedding of a given virtual network instance can be performed using any of the alternatives from a given set of topology alternatives. We provide two efficient heuristics for VNEAP and show that having multiple virtual network alternatives for the same application is superior to the best results known for the classic formulation. We conclude that capturing the problem domain via VNEAP can facilitate more efficient network virtualization solutions.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
Theory vs. Practice in Modeling Edge Storage Systems
Authors:
Oleg Kolosov,
Mehmet Fatih Aktas,
Emina Soljanin,
Gala Yadgar
Abstract:
Edge systems promise to bring data and computing closer to the users of time-critical applications. Specifically, edge storage systems are emerging as a new system paradigm, where users can retrieve data from small-scale servers inter-operating at the network's edge. The analysis, design, and optimization of such systems require a tractable model that will reflect their costs and bottlenecks. Alas…
▽ More
Edge systems promise to bring data and computing closer to the users of time-critical applications. Specifically, edge storage systems are emerging as a new system paradigm, where users can retrieve data from small-scale servers inter-operating at the network's edge. The analysis, design, and optimization of such systems require a tractable model that will reflect their costs and bottlenecks. Alas, most existing mathematical models for edge systems focus on stateless tasks, network performance, or isolated nodes and are inapplicable for evaluating edge-based storage performance.
We analyze the capacity-region model - the most promising model proposed so far for edge storage systems. The model addresses the system's ability to serve a set of user demands. Our analysis reveals five inherent gaps between this model and reality, demonstrating the significant remaining challenges in modeling storage service at the edge.
△ Less
Submitted 23 August, 2023;
originally announced August 2023.
-
Optimal LRC codes for all lenghts n <= q
Authors:
Oleg Kolosov,
Alexander Barg,
Itzhak Tamo,
Gala Yadgar
Abstract:
A family of distance-optimal LRC codes from certain subcodes of $q$-ary Reed-Solomon codes, proposed by I.~Tamo and A.~Barg in 2014, assumes that the code length $n$ is a multiple of $r+1.$ By shortening codes from this family, we show that it is possible to lift this assumption, still obtaining distance-optimal codes.
A family of distance-optimal LRC codes from certain subcodes of $q$-ary Reed-Solomon codes, proposed by I.~Tamo and A.~Barg in 2014, assumes that the code length $n$ is a multiple of $r+1.$ By shortening codes from this family, we show that it is possible to lift this assumption, still obtaining distance-optimal codes.
△ Less
Submitted 1 February, 2018;
originally announced February 2018.
-
When Do WOM Codes Improve the Erasure Factor in Flash Memories?
Authors:
Eitan Yaakobi,
Alexander Yucovich,
Gal Maor,
Gala Yadgar
Abstract:
Flash memory is a write-once medium in which reprogramming cells requires first erasing the block that contains them. The lifetime of the flash is a function of the number of block erasures and can be as small as several thousands. To reduce the number of block erasures, pages, which are the smallest write unit, are rewritten out-of-place in the memory. A Write-once memory (WOM) code is a coding s…
▽ More
Flash memory is a write-once medium in which reprogramming cells requires first erasing the block that contains them. The lifetime of the flash is a function of the number of block erasures and can be as small as several thousands. To reduce the number of block erasures, pages, which are the smallest write unit, are rewritten out-of-place in the memory. A Write-once memory (WOM) code is a coding scheme which enables to write multiple times to the block before an erasure. However, these codes come with significant rate loss. For example, the rate for writing twice (with the same rate) is at most 0.77.
In this paper, we study WOM codes and their tradeoff between rate loss and reduction in the number of block erasures, when pages are written uniformly at random. First, we introduce a new measure, called erasure factor, that reflects both the number of block erasures and the amount of data that can be written on each block. A key point in our analysis is that this tradeoff depends upon the specific implementation of WOM codes in the memory. We consider two systems that use WOM codes; a conventional scheme that was commonly used, and a new recent design that preserves the overall storage capacity. While the first system can improve the erasure factor only when the storage rate is at most 0.6442, we show that the second scheme always improves this figure of merit.
△ Less
Submitted 22 April, 2015;
originally announced April 2015.
-
Convergence of Tâtonnement in Fisher Markets
Authors:
Noa Avigdor-Elgrabli,
Yuval Rabani,
Gala Yadgar
Abstract:
Analyzing simple and natural price-adjustment processes that converge to a market equilibrium is a fundamental question in economics. Such an analysis may have implications in economic theory, computational economics, and distributed systems. Tâtonnement, proposed by Walras in 1874, is a process by which prices go up in response to excess demand, and down in response to excess supply. This paper a…
▽ More
Analyzing simple and natural price-adjustment processes that converge to a market equilibrium is a fundamental question in economics. Such an analysis may have implications in economic theory, computational economics, and distributed systems. Tâtonnement, proposed by Walras in 1874, is a process by which prices go up in response to excess demand, and down in response to excess supply. This paper analyzes the convergence of a time-discrete tâtonnement process, a problem that recently attracted considerable attention of computer scientists. We prove that the simple tâtonnement process that we consider converges (efficiently) to equilibrium prices and allocation in markets with nested CES-Leontief utilities, generalizing some of the previous convergence proofs for more restricted types of utility functions.
△ Less
Submitted 20 April, 2015; v1 submitted 26 January, 2014;
originally announced January 2014.