Competitive Analysis of Online Path Selection: Impacts of Path Length, Topology, and System-Level Costs
Abstract
Consider a communication network to which a sequence of self-interested users come and send requests for data transmission between nodes. This work studies the question of how to guide the path selection choices made by those online-arriving users and maximize the social welfare. Competitive analysis is the main technical tool. Specifically, the impacts of path length bounds and topology on the competitive ratio of the designed algorithm are analyzed theoretically and explored experimentally. We observe intricate and interesting relationships between the empirical performance and the studied network parameters, which shed some light on how to design the network. We also investigate the influence of system-level costs on the optimal algorithm design.
1 Introduction
From communication networks to transportation networks, strategically allocating network resources to competing users in a decentralized way is a recurring theme in network research. Network operators design resource allocation strategies to achieve specific goals, including revenue maximization, social welfare maximization, and cost minimization. In transportation networks, designing efficient local routing strategies for vehicles to best accommodate to users’ dynamic demands is one of the key challenges. In parallel, in communication networks, routing, congestion control and scheduling are practical real-time resource allocation mechanisms to improve the network performance. This work focuses on routing data traffic in communication networks. Following the convention of economics, data source nodes are considered as self-interested agents who demonstrate sufficient autonomy and pure rationality when making decisions. Each agent decides to send data through the network or not and select routing paths at will, as is the case with source routing in the future Internet [1]. Specifically, we are concerned about how to navigate data traffic from different agents through the network such that the social welfare is maximized.
One concern among others that network operators typically have is the allocation efficiency of the limited network capacity. Given the welfare of each agent for routing her data through a certain path, integer linear programming can model and deal with this concern. However, the set of agents in the network is usually dynamic. Which agents will join is generally unknown to the network operator a priori – multiple methodologies are devoted to dealing with this uncertainty. Each methodology makes a different set of assumptions. Assuming data – e.g., the welfare and resource consumption level of each agent – follow an either known or unknown probability distribution, one can employ stochastic optimization methods to provide a performance guarantee if an underlying distribution exists but little can be guaranteed when outliers don’t belong to the modelled distribution. Thus, to avoid the dependency on any stochastic assumption, we follow the worst-case analysis framework, which is a robust modeling and analysis framework that makes the least assumptions about the environment.
The worst-case analysis framework compares the performance of a decision-maker who is uninformed about the future with the performance of a hypothetical oracle who has perfect foresight and can make optimal decisions. It provides a comparative performance guarantee that holds even in the worst-possible scenario. In other words, this framework assumes an adversary who can manipulate the sequential data and the environment. Two performance measures dominate this field of analysis – the competitive ratio and the adversarial regret. The primary difference between them is the type of performance guarantee they provide. The regret provides an additive guarantee, bounding the difference between the decision-maker’s performance and the optimal one. In contrast, the competitive ratio offers a multiplicative guarantee, meaning the decision-maker’s performance is bounded by a constant factor of the optimal performance. This work adopts the competitive ratio as the performance measure of interest.
Another concern of network operators is the performance evaluation of routing algorithms under various network configurations [2]. By understanding the impacts of network configurations on the algorithmic performance, one can better configure the network to improve. For instance, the more nodes connecting the source and destination nodes, the longer the time it takes to transfer the data. Taking time as a limited and precious resource, network operators usually prefer the shortest-path routing which minimizes the data transfer time. Also, the average path length of a network topology, defined as the average path length between any two nodes, is usually linked to the easiness for communication within the network [3]. For example, a larger average path length in a communication network indicates a slower and less efficient information transfer process. Thus, to investigate the impact of the path length and the topology on the social welfare, we assume that possible path lengths fall into a known interval, characterizing the uncertainty perceived by the network operator in users’ path lengths, and ask the question, how does the uncertainty in path lengths affect the social welfare in different topological networks?
In addition to network configuration parameters, the social welfare is also deeply influenced by the presence of costs. For example, the queuing delay experienced by users is usually viewed as a type of cost. Packets will be discarded by applications if their waiting times are unacceptably long, and the user experience is usually inversely related to the experienced delay. An innate property of the queuing delay is that it is experienced and influenced by all agents in the system, leading to coupling effects between agents. A well-designed admission control or packet scheduling strategy can exert a distributed system-level control over the queuing delay and improve the overall service experience. With more agents joining the system, the social welfare is increased from serving more demands, while the competition becomes tenser, and thus a higher cost, decreasing the social welfare. Queuing theory has been partially devoted to understanding and characterizing the queuing delay within the system. We incorporate the mathematically well-defined queuing delay therein as a cost and investigate the influence of such system-level costs on the algorithm design.
1.1 Related Work
Online Competitive Resource Allocation. The worst-case analysis technique of this paper falls under the umbrella of the competitive analysis framework [4]. There exists a series of works closely related to the problem studied here, such as competitive online routing [5, 6] and variants of online knapsack [7, 8]. Surprisingly, none of the above works studies either the impact of the topology or the path length on the performance, which partially motivates this work. In comparison, online resource allocation with costs has been studied under different scenarios. For example, online combinatorial auction with convex costs was studied in [9], and welfare maximization with polynomial costs was studied in [10]. However, a cost function that goes to infinity when reaching the capacity limit, such as the queuing delay, has not been studied before.
Routing Games. Similar routing problems have also been studied via the lens of game theory, such as selfish routing games [11, 12] and network congestion games [13]. The performance measure of interest is the so-called price of anarchy, which compares the system performance where agents make decisions locally and selfishly with that produced by a centralized optimizer. It characterises the inefficiency of an equilibrium caused by the absence of a centralized regulator. In general, prior works mentioned here are concerned with the decentralized aspect of the problem, specifically, the interplay between agents, while this work is focused on retaining competitive against the uncertainty of the future. It is worth mentioning that the combination of these two aspects is an interesting and challenging direction where more attention is deserved.
Regret Analysis. The regret offers an alternative additive guarantee to the decision maker against the uncertainty of future. The field of online convex optimization dedicates to analyzing the regret compared with static or dynamic benchmarks. The online convex optimization with constraints is close to our system setting. In [14], they studied an online convex optimization problem with time-varying constraints and compared the designed online algorithm with a dynamic benchmark. Regret and constraint violations were analyzed for the proposed algorithm. The constraints in our setting are time-varying but coupled across time slots, and we do not allow constraint violations. Moreover, it has been explored that best-of-both-worlds guarantees, i.e., a sublinear regret and a bounded competitive ratio at the same time, can be achieved under specific settings, such as in metrical task systems [15]. To the best of our knowledge, it remains unknown whether best-of-both-worlds guarantees exist in other online problems.
Online Algorithm with Constrained Adversary. Another recent trend in the field of online algorithms is to consider a constrained adversary. Instead of granting the adversary arbitrary power to manipulate future arrivals, additional control could be exert on the possible arrival instance. For example, future prices were restricted in a known interval in the online selection problems [16]. Under different constrained adversaries, the design strategy of competitive online algorithms could be completely different. For example, in the online selection problem, an adversary that constrains the price range and one that constrains the horizon admits completely different competitive algorithms. This work can be viewed as designing competitive algorithm against the adversary who is constrained on the path length and the topology.
1.2 Contributions and Paper Organization
Our main contribution in this work is as follows. First, we consider the online path selection problem with constraints on path lengths and network topology. A set of topology-dependent competitive ratios are derived for the considered line and tree topologies. Second, we study the impacts of the minimum path length for the first time and recover existing results about the logarithmic dependence of the competitive ratio on the maximum path length . We show that the minimum path length plays a role of varying importance in different networks. Specifically, the competitive ratio decreases slower with in tree networks compared to line networks, which also highlights the influence of the topological structure. Finally, we conduct extensive experiments to examine our theoretical findings and explore the performance of different price aggressiveness, which is a parameter in the designed algorithm. Our results show that the relationship between the empirical ratio and the path length bound varies for different topologies and different price aggressiveness, for which we provide an in-depth analysis and offer insights into the network design.
The rest of this paper is organized as follows. Section 2 introduces the system model and derives competitive ratios that are dependent on the network topology and the path length. Specifically, two fundamental networks, line networks and hierarchical tree networks, are studied. We also provide an analysis on the impact of system-level costs on the competitive algorithm design in this section. In Section 3, we conduct extensive experiments to examine the empirical performance of the online algorithm. Specifically, we first examine the gap between worst-case theoretical guarantees and empirical performance against stochastic arrivals, and then we verify the theoretical results by running the algorithm on certain hard instances. For the path selection with cost problem, we show the logarithmic trend of the competitive ratio with respect to the maximum value density by numerical methods. Finally, we conclude the paper in Section 4.
2 System Description and Results
The system of concern is described as follows. We consider a network whose topology is fixed. Nodes in the network can be viewed as routers or servers. Edges connecting nodes are endowed with fixed capacities, which refers to capacities of fixed electronic wires.
(Arrival Instance) Agents who need to be routed from one node to another node arrive at the network in an online fashion. There are agents in total, but the decision-maker does not know the value of . An agent submits a reservation request on her arrival to use a certain bandwidth for transmitting data along some routing path. The strategic setting is considered here, where each agent holds a private value of her demand if fulfilled and could report false values to the network for her benefit. In summary, each agent can be characterized by the following parameters:
-
•
Value:
-
•
Rate requirement:
-
•
Source and destination nodes: and
-
•
A set of possible paths connecting and :
Without the loss of clarity, we use agents and requests interchangeably throughout the paper.
Assumption 1 (Small Request Size).
The rate requirement of any agent is upper-bounded by .
Assumption 1 is self-explanatory in many applications. For example, in cloud data centers where individual workloads are negligible compared to the computing capacity of servers. In communication networks with a considerable size, it is also expected that individual requests is negligible in comparison to the transmission capacity of any edge in the network. It is also important for the theoretical analysis, for example, in the proof of Theorem 1.
Assumption 2 (Bounded Path Length).
The path that a request can select is bounded in its length, i.e., .
Assumption 2 further constrains the set of possible arrivals by limiting the number of edges on any routing path.
In addition, any reasonable agent should not hold an infinite value of a finite rate. The following modeling assumption is to formalize this observation.
Assumption 3 (Bounded Value Density).
For any agent , the ratio between her value and her total resource consumption is bounded, i.e., .
Assumption 3 sets uniform bounds on the per-unit value of any request, which leads to the value of user in proportion to the number of edges on path , i.e., , where is the path length of . This is a well-accepted assumption for various online decision problems such as the online time series search [17, 18] and online knapsack problem [7, 8], etc. Online path selection can be viewed as a special case of online knapsack problem [19].
Following the standard competitive analysis framework, the performance of an online algorithm is characterized by the competitive ratio, defined as
where denotes an instance and represents the family of instances that satisfy Assumptions 1-3.
2.1 Posted-Price Mechanism
We propose Algorithm 1 below, whose nature is a posted-price mechanism. A central operator maintains a price for each edge in correspondence to its utilization level and announces the edge prices publicly. When an agent arrives, she calculates the minimum price over all paths that can fulfill her demand, compares it with her private value, and decides to join or leave the network based on the comparison. Importantly, a posted-price mechanism is both incentive-compatible and privacy-preserving as the agent does not need to report her private value to a central operator [20].
The price of a path , i.e., , is calculated by summing over the price of all edges on this path, i.e., , and the pricing function is parameterized by a parameter : . The exponential pricing function is a classic choice in online algorithm design, where is a parameter that guides the aggressiveness of the price. If is larger, the price increases much faster with the utilization, indicating that more capacity is reserved for the future, and thus leading to a more conservative allocation.
2.2 Main Results I: Topology-Dependent Theoretical Guarantees of PPM-PSϕ
To understand what effect the network structure imposes on the performance of the mechanism PPM-PSϕ, a set of fundamental and amiable network topologies, i.e., line networks and tree networks, are studied in this subsection.
2.2.1 Line Network
Line networks are the simplest networks. We consider a bi-directional line network with nodes and edges. The following theorem shows the competitive ratio of PPM-PSϕ for a line network.
Theorem 1.
For line networks, when , PPM-PSϕ is -competitive, where is the ratio between the largest capacity and the smallest capacity in the network.
Proof.
For line networks, partition the line network into disjoint lines , each containing consecutive edges and nodes. Requests can travel through at most two -long lines. Those starting from and ending in are grouped in , and those starting from and ending in are grouped in . Let , and . Because the data transmission is usually unidirectional, requests in do not affect those in . Built on this decoupling, we have
where and denotes the optimal revenue and the revenue of the online algorithm given the instance . To simplify the notation, we drop the superscripts and from now on and focus on requests in one direction, e.g., is the set of requests that start from line network .
Let . All requests in affect edges in . In the sequel, we focus on the upper bound for the ratio over instances in any -long line network because the competitive ratio is upper-bounded as:
Let . Any edge in can be possibly affected by requests in . When there is no saturated edge in , i.e., no edge with , after the th request with is routed, the value generated by the online algorithm increases by . The increase to the optimal solution is upper-bounded by based on the weak duality, and we have
It follows that
because , , and is decreasing in . When , we have . Summing over , we have , and . Therefore, the competitive ratio for the case without edge saturation is .
When there exist almost-saturated edges (case with edge saturation), i.e., , we need to show that the algorithm output is still lower-bounded by a portion of the optimal value, when requests are rejected due to the capacity limit instead of an insufficient value. Corollary 1 characterizes the largest possible lower bound by an optimization problem. Then we use Corollary 2 to bound the competitive ratio. Both corollaries are useful for the analysis of the tree network as well.
Corollary 1.
If there exists a link whose is close to its capacity , the minimum value of is the optimal value of the following optimization problem:
where is the amount of rate allocated to the th request that uses edge , is the set of edges that can share a path of length with edge , and is the set of requests that utilizes edge .
Corollary 2.
The competitive ratio is the maximum of the ratio for the case with edge saturation and the ratio for the case without edge saturation.
Assume that is a multiple of . A commonly-employed lower bound of the algorithm output is the final total prices of all edges in the network as follows.
Lemma 1.
.
Proof.
We have
where the last inequality follows from that is decreasing in . ∎
It then remains to bound the optimal revenue and final edge prices for the case with edge saturation, which are dependent on the network topology and the edge capacities.
If , for a -long line network, the worst-case scenario is that each almost-saturated edge blocks an -long request with the highest valuation. There are at most 3 such long and valuable requests blocked by three almost-saturated edges. Thus, the optimal revenue is upper-bounded by , the online revenue is lower-bounded by
and the ratio is upper-bounded by .
The overall competitive ratio is then upper-bounded by by choosing .
For line networks with heterogeneous capacities, denote the minimum capacity in as and the edge as and the maximum capacity of edges within reach of edge in as . The worst-case scenario happens when edge is almost-saturated and blocks an -long request. The optimal revenue is upper-bounded by , the online revenue is lower-bounded by
and the ratio is upper-bounded by , where . Thus, the overall competitive ratio is upper-bounded by by choosing . When is large, is upper-bounded by by choosing . Thus, the competitive ratio is upper-bounded by .
∎
2.2.2 Tree Network
We consider a directed full binary tree of depth and the following two typical arrival patterns in tree networks.
-
•
Start from Root (SR): All requests start from the root node. This corresponds to the case when there is one source node in the communication network.
-
•
End at Leaf (EL): Requests must end at any leaf node but not necessarily start from the root node. This corresponds to the case when every non-leaf node can be the source node and generate data.
Theorem 2.
For SR requests, when edge capacities are identical (uniform capacity case), the competitive ratio is . When the -level edges have capacity (exponentially-decreasing capacity case), the competitive ratio is .
Proof.
We start with the case when all edges have the same capacity . From Lemma 1, we have . The optimal revenue is upper-bounded by allocating the capacity of the top-level edge to the highest-valued requests: . If there is an edge that reaches the capacity, it will be the top-level edge, and there are at most edges at level among which the load is evenly distributed, then we have
The ratio for the case with edge saturation is then upper-bounded by , and the competitive ratio is eventually bounded by by choosing .
We then consider the influence of heterogeneous capacities on the performance of our mechanism by studying the case where edges at the th level are endowed with a capacity of . In this case, edges of the first level may not be the first saturated. Let the first saturated edge be of the th level () and , the algorithmic output is lower-bounded in
The above inequalities hold for the following reasons. Saturating an edge of the th level (with capacity ) leads to that each of the ancestor edges is consumed at least , and edges of child levels are also saturated because each child edge only has one ancestor edge and the total capacities over an edge’s child edges are the same to its own capacity. The optimal value is upper-bounded as because the bottleneck link is of capacity .
The competitive ratio is then upper-bounded by . We thus complete the proof of Theorem 2. ∎
Theorem 3.
For EL requests, when edge capacities are identical, the competitive ratio is . When the -level edges have capacity , the competitive ratio is .
Proof.
In a full binary tree, the source nodes of concern must be of depth . For identical capacity case, the optimal value is upper-bounded by . Denote the saturated edge with the lowest level as and the level of its parent node as . It is obvious that any ancestor edge of is also saturated. The algorithm output ALG is lower-bounded by
The competitive ratio is upper-bounded by
by choosing . Thus, the competitive ratio is upper-bounded by .
For the case where the capacity of the -th level edge is , the optimal value is upper-bounded by , where is defined the same as above. The algorithmic output is lower-bounded in . The ratio for the saturated case is thus upper-bounded by by choosing . Thus, the competitive ratio is upper-bounded by .
∎
Remark 2.
The following observations and understandings are gained:
-
•
For SR requests, the competitive ratio for uniform capacity case is smaller than that for the exponentially-decreasing capacity case, demonstrating the difficulty of the latter.
-
•
The EL requests are harder than SR requests when edge capacities are identical, while it is the opposite for exponentially-decreasing capacity case. It shows the intricate interaction between the request pattern and the network design, especially the configuration of link capacities.
-
•
We also observe that the competitive ratio of EL requests with exponentially-decreasing capacity is the same as that of the line network with uniform capacity. The matching between the request pattern and the network configuration should thus be deemed as vital for a good competitive ratio.
2.3 Main Results II: Impact of System-Level Costs on Optimal Design of PPM-PSϕ
As mentioned in the Introduction, the incurred waiting time at nodes leads to a system-level cost, namely the service quality degradation caused by the network congestion, requiring additional consideration in balancing between revenues and costs to further improve social welfare. We model the cost as follows. The sum of mean rates for all flows passing through edge is defined as , where indicates that edge is on the path of th agent , and indicates the opposite. In this work, each edge is modeled as an queue with the arrival rate and the service rate . The cost is quantified by the total number of packets in the network , where
and is the utilization of edge . It is well-accepted in the queuing theory that the number of packets in the network is positively related to the average network delay, and thus a useful indicator for the network congestion. Other typical preferences of network operators, such as maximizing the minimum load, can also be incorporated by enforcing different ’s. In this regard, can be viewed as a regularizer of the network state.
When the minimum path length , the worst-case instance is topology-dependent as shown in the previous subsection. To avoid over-complicating the problem and enable the analysis for the case with costs, we consider here.
Theorem 4 provides a set of sufficient conditions on the pricing function to remain competitive after considering the system-level cost.
Theorem 4 (Sufficiency).
For any given , is -competitive if and is an analytic and non-decreasing solution to the following differential equation with boundary conditions:
(1) |
where satisfies .
Proof.
Before any agent arrives, , and the optimal OPT is upper-bounded by , where By setting , we have .
If agent joins the system, the social welfare increases by
where is the value margin of agent , i.e., and .
The optimal social welfare increases at most
Being -competitive is implied by the following inequality:
which is further implied by the inequality over each agent as follows:
By dividing at both sides, we have which is implied by the differential equation
The right boundary condition is determined by identifying the worst-cast instance and ensuring the -competitiveness for it. One worst-case instance consists of agents who can be routed via unit-length paths. Two phases in this instance exist: in the first phase, there come agents with valuation increasing from to ; followed by agents with valuation in the second phase. ∎
Theorem 5 reinforces the significance of Eq. (1) by showing that when the rate-to-capacity ratio is infinitesimal, the existence of a -competitive online mechanism for the case with cost is equivalent to the existence of a solution to the integral version of Eq. (1).
Theorem 5 (Necessity).
For any , if there exists an -competitive deterministic online mechanism (not necessarily PPMs) for the online path selection problem with convex costs and the infinitesimal rate-to-capacity ratio, then the integral version of Eq. (1) has at least one solution.
Proof.
Denote a group of agents with value density and total demand as . Consider the following instance indexed by , : there come s with increasing from to continuously. After that, there comes with . The optimal solution is composed of all agents in the last group of the instance , i.e., group , and its welfare is Define the utilization of link of any -competitive online algorithm after processing as . Denote the output of an online algorithm as ALG. Given the -competitiveness, the following inequality holds for :
ALG | ||||
(2) |
If there exists a -competitive online algorithm (not necessarily PPM), we can always construct a PPM with and to be at least -competitive.
The construction is as follows: Due to the definition of , we have , for all . If , agents that incur negative welfare () will join, and thus there always exists a more competitive online algorithm with . If , we can always construct an algorithm at least -competitive by stopping the allocation right before the utilization hits the effective utilization , because the increase of the link costs after exceeding the effective utilization is greater than the increase of the value; if , we can always allocate the remaining of link to and achieve a competitive ratio no worse than .
Thus, for any -competitive online algorithm, there is a that satisfies Eq. (3):
(3) |
3 Experiments
3.1 Description of Experiment Setting
(a) Line Network
(b) Tree Network with SR requests
In line networks, 100 nodes in a line are connected by edges of uniform capacity 100. We conduct independent simulations, each generating requests with . In particular, the path length and the value density of a request are drawn uniformly random from and , respectively.
In tree networks, a full binary tree of depth is generated, with the capacity of the two edges closest from the root set at 2560, and capacity of subsequent edges decaying exponentially at each level. We conduct independent simulations, each generating requests that originate from the root with a random trajectory down the tree. Similarly, the path length and the value density of a request are drawn uniformly random from and , respectively. Figure 1 illustrates the setting.
In both cases, we compute by solving an integer programming problem with Gurobi for each arrival instance .
Then, in an effort to simulate a hard arrival instance that challenges the online algorithm, we construct requests with progressively longer paths and increasing value densities for each given path length. This strategy aims to trick the online algorithm into accepting shorter and lower-valued requests and therefore leading to bottlenecks. In contrast, the optimal strategy in hindsight is to reject such requests and accept requests of higher value and longer length.
Lastly, we run an experiment to examine the relationship between the competitive ratio and the maximum price for the case with cost.
(Choices of ) Optimal designs that hedge against worst cases usually exhibit overly cautious and conservative empirical behaviours. To address this issue, many attempts have been made to design data-driven designs that also deliver effective practical performances [21]. In our design, the larger the , the more rapidly the link price increases and therefore the more conservative the online algorithm is. We conduct experiments to examine how price aggressiveness impacts the empirical performance in different topologies and path length bounds.
3.2 Experimental Findings and Discussions
3.2.1 Impacts of Maximum Path Length

(Line Network) In Figure 2, we see that when , the empirical ratio increases in a logarithmic manner with , which is consistent with the competitive ratio. The intuition is that the optimal allocation OPT possesses greater power over choosing requests of higher-valued requests of longer paths as increases. Additionally, we observe rather consistent increasing trends in edge utilization levels as requests of longer path penetrate further into the line network. Meanwhile, there still exist edges with relatively low utilization levels as the maximum path length is still small compared to the total number of edges in the network. On the other hand, a longer request stands a greater chance of passing through a highly utilized edge, leading to an overall higher price to fulfill this request and thus a drop in the acceptance rate. This decline in the acceptance rate is particularly pronounced when as it leads to the sharpest increase in edge prices with utilization levels due to its implied conservativeness.
(Tree Network) Figure 3 exhibits conflicting relations between and the empirical ratio. When , the empirical ratio increases with ; when , the empirical ratio also increases with with a drop when ; when , the empirical ratio decreases, which is contrary to our theoretical findings. It sheds light on the gap between the worst-case analysis and the empirical performance.
Firstly, when , both the acceptance rate of the online algorithm and the maximum utilization over all edges experience a significant drop compared to the cases when due to its high price. In this case, the network is far from being saturated and is overall under-utilized. Thus, the worst-case scenario of having bottlenecks due to edge saturation has not come into the picture yet. It is also not hard to understand why the empirical ratio decreases with the maximum length in the unsaturated case. When increases, the average value of users increases, which implies that being conservative at larger values is more advantageous because future agents are more likely to bring a much higher value.
Moreover, the empirical ratio is the smallest when , which illustrates that a good should balance between being overly aggressive () and overly conservative (), and thus achieve a good trade-off between maximizing the resource utilization efficiency and reserving enough resources for the future. It can be done by increasing for larger values while maintaining sufficient utilization levels. In addition to optimizing , it also indicates that the maximum path length has a negative effect in the empirical ratio. We advise that network operators keep this in mind and scale the network without increasing the average path length too much. A possible guideline is to try to avoid deep trees in the network and keep an as-flat-as-possible structure.
3.2.2 Impacts of Minimum Path Length

The trends of the empirical ratio with in line and tree networks and results for hard instances are discussed in the following. In short, we observe interesting trends for stochastic instances that are partially inconsistent with the theoretical results from the worst-case analysis framework and offer detailed analysis for each of them.
(Line Network) Figure 4 shows the relationship between the empirical ratio and the minimum path length for line networks under different price aggressiveness . As the minimum path length increases towards the maximum path length , the range of possible starting points that can guarantee a minimum path length narrows, making it more likely that requests share a common set of edges. These common edges are thus frequently requested and more likely to be rather saturated, hindering the online algorithm from selecting highest-valued requests whereas the optimal allocation can perform the maximization ex post.
When there exist saturated edges as shown in the utilization row of Figure 4, as increases, in a line network with homogeneous capacities, the neighbouring edges tend to be extensively utilized as well. Therefore, more requests are rejected due to the resulting high price. It is thus better to be somewhat conservative and avoid using up too much capacity too fast by accepting many lower-valued requests. Due to such susceptibility to the saturation, it is thus more challenging for the online algorithm to perform as close as possible to the optimal allocation, leading to an increase in the empirical ratio.
Interestingly, we also observe a sudden drop in the empirical ratio when approaches . In this case, requests become increasingly similar in that there are many common edges requested. We conjecture that this results in a significantly reduced ability for even the optimal allocation to optimize, as this phenomenon can be largely explained by the drop in its average utilization rate.
(Tree Network) Figure 5 shows the relationship between the empirical ratio and the minimum path length for tree networks under different price aggressiveness . We see that when , the empirical ratio decreases with , which is consistent with our theoretical findings. We also observe intricate trends in the empirical ratio not explained by our theoretical results. We argue that this is due to the inherent limitation of the worst-case analysis framework as it cannot effectively characterize empirical performance on stochastic inputs. In particular, when , the empirical ratio decreases at first and then increases with ; when , the empirical ratio increases with with a minor drop when . We offer discussions on the observed phenomena in the following.


When increases, the requests will be required to travel through more edges in the network, and thus the average edge utilization levels of both the online algorithm and the optimal allocation increase. When , all requests are directed all the way down to leaf nodes. Therefore, the minimum utilization of the optimal allocation becomes positive, as all edges, even at the lowest level, will be requested in expectation.



Additionally, we observe that the utilization levels and the acceptance rate of the online algorithm () and the optimal allocation are almost identical. It means that the optimal allocation strategy acts closely to a greedy scheme when the environment is stochastic. However, in terms of the empirical ratio, the online algorithm () still outperforms the other two. It clearly shows that an online algorithm does not need to closely mimic the optimal allocation to have a small empirical ratio.
It is no surprise that the empirical ratio of the online algorithm () increases with given that the maximum utilization of the optimal is strictly smaller than . The instances generated do not incur any edge saturation for any . It means that in the online algorithm, every request leaves the network because of an insufficient value. However, with increasing, it is more likely for two requests to share more edges, leading to more coupling effects between requests. Consider two requests with path length difference , and one path contains the other. Assume that the value densities of the two paths are such that the longer one can provide a higher value but the value density of the shorter one is larger. The longer one can be easily told off if the shorter one is accepted first, and thus it creates a harder time for the online algorithm to distinguish between them. But it is much easier for the algorithm to drop the ones with a smaller value if is smaller because it is less likely to encounter the aforementioned conundrum, where one needs to choose between requests with conflicting values and value densities.
When there exists edge saturation (maximum utilization is 1 for ), it verifies the theory that the ratio decreases with when there exists edge saturation. But the theory does not predict as to why the ratio increases (right half of ). Observing the utilization, as soon as the online algorithm starts to accept less than the optimal, the empirical ratio increases. One possible reason is that by setting , there exists a mix of saturated edges and unsaturated edges in the network, and the empirical ratio increases due to the same reason as . This reveals again the limitation of the worst-case analysis approach when applied to complex multi-dimensional systems, for which worst-case instances are typically hard to pin down.
3.2.3 Hard Instances
Having observed mixed results against stochastic inputs, we are interested in finding out how the online algorithm performs against challenging instances. In face of strategically constructed hard instances, we observe replicating trends that match our theoretical findings.
The construction of hard instances is as follows: we generate requests with progressively long path length, and for each path length, we gradually feed the online algorithm requests with increasing value densities, starting from the lower bound. In the second part, we provide high-valued requests with long path length. In essence, we want to trick the online algorithm into accepting shorter, lower-valued requests in the first part and create bottlenecks that prevent it from accepting requests in the second part. On the other hand, the optimal allocation strategy should simply ignore requests in the first part and accept requests in the second part.

Figure 6 shows the relationship between the empirical ratio and in line networks, where indicates the fluctuation ratio of path lengths. Intuitively, a larger ratio indicates greater uncertainty and brings additional challenges. As shown before, the order-optimal choice of is given in Theorem 1, and we select in the experiment. For , the empirical ratio increases linearly, whereas when , the empirical ratio grows logarithmically, reasserting the order optimality of our results.
Figure 7 shows that empirical ratios decrease with and increase with in tree networks when faced with hard instances for , which confirms our theoretical guarantees. Specifically, we observe that when , it delivers the best performance in both cases. Intuitively, a conservative strategy is beneficial when faced with a particularly challenging instance. Lastly, the empirical ratio is logarithmic in when , further verifying previous theoretical results.
3.2.4 Path Selection with Cost
For the online path selection with cost, we have shown that if a solution to Eq. (1) with parameter exists, there is a corresponding online algorithm that achieves -competitive. However, Eq. (1) is notoriously difficult to analyze as a non-autonomous differential equation with singular boundary conditions. Therefore, we resort to find the smallest such that a solution exists numerically, and show its logarithmic growth w.r.t. in Figure 8, in which the link capacity is set to .
4 Conclusions
In this paper, we investigated the role of the network topology and path lengths in determining the performance of a posted-price mechanism in the online path selection problem. We established new results about the dependence of competitive ratio on the path length bounds, recovered existing results about the dependence on the maximum path length, and elucidated particularly the varied influence of the path length bounds across different networks, in specific, line and hierarchical tree networks. Moreover, we studied the impact of system-level costs on the algorithm design and established sufficient and necessary conditions to be competitive. At last, we conducted extensive empirical experiments, which not only confirms our theoretical discovery but also uncovers the subtler effects of network structure on algorithmic performance for stochastic scenarios. These findings offer valuable insights for future development of more adaptive online algorithms that are tailored to specific network characteristics like bounded path lengths, and we hope it paves the way for further research in the domain of online algorithms against other types of constrained adversaries and other system-level coupling effects.
References
- [1] C. I. S. WG, “Source packet routing in networking,” 2018.
- [2] S.-J. Yang, “Performance evaluation of routing algorithms under various network configuration parameters,” International Journal of Network Management, vol. 7, no. 4, pp. 183–197, 1997.
- [3] Q. Ye, B. Wu, and B. Wang, “Distance distribution and average shortest path length estimation in real-world networks,” in Advanced Data Mining and Applications: 6th International Conference, ADMA 2010, Chongqing, China, November 19-21, 2010, Proceedings, Part I 6. Springer, 2010, pp. 322–333.
- [4] A. Borodin and R. El-Yaniv, Online computation and competitive analysis. Cambridge University Press, 2005.
- [5] P. Bose and P. Morin, “Competitive online routing in geometric graphs,” Theoretical Computer Science, vol. 324, no. 2-3, pp. 273–288, 2004.
- [6] N. Buchbinder and J. Naor, “Improved bounds for online routing and packing via a primal-dual approach,” in 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06). IEEE, 2006, pp. 293–304.
- [7] B. Sun, L. Yang, M. Hajiesmaili, A. Wierman, J. C. Lui, D. Towsley, and D. H. Tsang, “The online knapsack problem with departures,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 6, no. 3, pp. 1–32, 2022.
- [8] L. Yang, A. Zeynali, M. H. Hajiesmaili, R. K. Sitaraman, and D. Towsley, “Competitive algorithms for online multidimensional knapsack problems,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 5, no. 3, pp. 1–30, 2021.
- [9] X. Tan, B. Sun, A. Leon-Garcia, Y. Wu, and D. H. K. Tsang, “Mechanism design for online resource allocation: A unified approach,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 4, no. 2, pp. 1–46, 2020.
- [10] Z. Huang and A. Kim, “Welfare maximization with production costs: A primal dual approach,” Games and Economic Behavior, vol. 118, pp. 648–667, 2019.
- [11] T. Roughgarden and É. Tardos, “How bad is selfish routing?” Journal of the ACM (JACM), vol. 49, no. 2, pp. 236–259, 2002.
- [12] R. Banner and A. Orda, “Bottleneck routing games in communication networks,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1173–1179, 2007.
- [13] B. Hao and C. Michini, “Inefficiency of pure Nash equilibria in network congestion games: the impact of symmetry and network structure,” ACM Transactions on Economics and Computation, 2024.
- [14] T. Chen, Q. Ling, and G. B. Giannakis, “An online convex optimization approach to proactive network resource allocation,” IEEE Transactions on Signal Processing, vol. 65, no. 24, pp. 6350–6364, 2017.
- [15] A. Daniely and Y. Mansour, “Competitive ratio vs regret minimization: achieving the best of both worlds,” in Algorithmic Learning Theory. PMLR, 2019, pp. 333–368.
- [16] Z. Jiang, P. Lu, Z. G. Tang, and Y. Zhang, “Online selection problems against constrained adversary,” in International Conference on Machine Learning. PMLR, 2021, pp. 5002–5012.
- [17] R. El-Yaniv, A. Fiat, R. M. Karp, and G. Turpin, “Optimal search and one-way trading online algorithms,” Algorithmica, vol. 30, pp. 101–139, 2001.
- [18] X. Tan, S. Yu, R. Boutaba, and A. Leon-Garcia, “Threshold policies with tight guarantees for online selection with convex costs,” in Proceedings of the 19th Conference on Web and Internet Economics (WINE), 2023.
- [19] Y. Cao, S. Yu, X. Tan, and D. H. K. Tsang, “Competitive online path-aware path selection,” ACM SIGMETRICS Performance Evaluation Review, vol. 51, no. 4, pp. 66–72, 2024.
- [20] M. Feldman, N. Gravin, and B. Lucier, “Combinatorial auctions via posted prices,” in Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms. SIAM, 2014, pp. 123–135.
- [21] A. Zeynali, B. Sun, M. Hajiesmaili, and A. Wierman, “Data-driven competitive algorithms for online knapsack and set cover,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 12, 2021, pp. 10 833–10 841.