5.4 Routing Number vs. Expansion 53
5.4 Routing Number vs. Expansion
In this section we establish a relationship between the routing number and
the expansion of a network. In [LR88] the following result is shown.
Theorem
5.4.1. Let H be a bounded degree network of size N with expan-
sion ~. Given any N-node bounded degree network G, and any 1-1 embedding
of the nodes of G onto the nodes of H, the edges of G can be simulated by
paths in H with congestion and dilation at least 12(~) and at most O(~)
Ot I"
Together with Theorem 6.0.1 we obtain the following result.
Theorem 5.4.2. Any bounded degree network of size N with expansion a
has a routing number
of
at lea, t a, d at most
As shown in the next theorem, these bounds are tight.
Theorem 5.4.3. For all 1IN < a < 1/logN, there exists a bounded degree
network of size N with expansion O(a) and routing number 0(~). Further-
more, for all log N/N < a < 1, there exists a bounded degree network of size
N with expansion O(a) and routing number O(I~
Ot P"
Proof. Let us start with constructing networks for the first case. According
to Corollary 5.3.1, the wrap-around butterfly (WBF) of size N has routing
number O(log N). Since for any d-dimensional WBF both of its two (d- 1)-
dimensional sub-butterflies have a size of d. 2 d-l, but only 2 d edges leaving
them, Theorem 5.4.2 yields that the expansion of a WBF of size N is bounded
by 1
O(~). If we replace each edge of the WBF by a path of length k, its
two (d - 1)-dimensional sub-butterflies have a size of O(kd. 24-1), but still
only 24 edges leaving them, that is, the expansion of the resulting network
is O(~). On the other hand, it is easy to show (by using, for instance,
the random rank protocol together with Valiant's trick, see Section 7.2) that
the worst case time for routing a permutation in this network, and hence its
routing number is O(k log N). This yields the first statement of the theorem.
Now we show how to construct networks for the second case. According
to Corollary 5.3.2, we know that every bounded degree expander of size N
has expansion O(1) and routing number O(logN). Let G be any of these
networks. If we replace each edge of G by a path of length k, it is easy to
see that the expansion of the resulting network is O(-~). On the other hand,
any permutation routing strategy in this network can be simulated by G in
asymptotically the same time (each node in G simulates k/2 nodes of each
path representing one of its edges). Hence, the worst case time for routing
a permutation in this network is at least the worst case time of routing a
k-relation in G, and therefore its routing number is Y2(k log N). This yields
together with Theorem 5.4.2 the second statement of the theorem. [3