In the Search of Optimal Tree Networks: Hardness and Heuristics

Pavel Martynov, Maxim Buzdalov, Sergey Pankratov, Vitaliy Aksenov, Stefan Schmid

Research output: Chapter in Book/Report/Conference proceedingConference Proceeding (ISBN)

Abstract

Traffic in datacenters may follow some pattern: some pairs of servers communicate more frequently than others. Demand-oblivious networks may perform poorly for such workloads, and demand-aware networks optimized for traffic should be used instead. Unfortunately, not all shapes of networks are feasible in real hardware. Practical limitations are usually provided in the form of a topology. For example, a network may be required to be a binary tree, a bounded-degree graph or a Fat tree.In this work, we consider a topology of a binary tree, one of the most fundamental network topologies. We show that already finding an optimal demand-aware binary tree network is NP-hard. Then, we explore how various optimization techniques, including simple local searches, as well as deterministic mutation and crossover operators, cope with generating efficient tree networks on real-life and synthetic workloads.

Original languageEnglish
Title of host publicationGECCO 2025 - Proceedings of the 2025 Genetic and Evolutionary Computation Conference
EditorsGabriela Ochoa
PublisherAssociation for Computing Machinery
Pages249-257
Number of pages9
ISBN (Electronic)9798400714658
DOIs
Publication statusPublished - 13 Jul 2025
Event2025 Genetic and Evolutionary Computation Conference, GECCO 2025 - Malaga, Spain
Duration: 14 Jul 202518 Jul 2025

Publication series

NameGECCO 2025 - Proceedings of the 2025 Genetic and Evolutionary Computation Conference

Conference

Conference2025 Genetic and Evolutionary Computation Conference, GECCO 2025
Country/TerritorySpain
CityMalaga
Period14 Jul 202518 Jul 2025

Keywords

  • binary trees
  • demand-aware networks
  • heuristics
  • NP-hardness

Fingerprint

Dive into the research topics of 'In the Search of Optimal Tree Networks: Hardness and Heuristics'. Together they form a unique fingerprint.

Cite this