1 Detecting Spatially- Close Fiber Segments in Optical Networks Farabi Iqbal Stojan Trajanovski Fernando Kuipers (Delft University of Technology) 16 March.

Slides:



Advertisements
Similar presentations
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Advertisements

Computer Network Topologies
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Optical networks: Basics of WDM
Motion Planning for Point Robots CS 659 Kris Hauser.
Visibility Graph Team 10 NakWon Lee, Dongwoo Kim.
Efficient Realization of Hypercube Algorithms on Optical Arrays* Hong Shen Department of Computing & Maths Manchester Metropolitan University, UK ( Joint.
Broadcasting in UDG Radio Networks with Unknown Topology Yuval Emek, Leszek Gąsieniec, Erez Kantor, Andrzej Pelc, David Peleg, Chang Su, Weizmann Liverpool.
Decomposition of overlapping protein complexes: A graph theoretical method for analyzing static and dynamic protein associations Algorithms for Molecular.
March 30, 2015 SPI Find the length of vertical or horizontal line segments in the first quadrant of the coordinate system, including problems.
EE663 Image Processing Edge Detection 5 Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
HCS Clustering Algorithm
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
HyperCuP – P2P Network Boyko Syarov. 2 Outline  HyperCup: What is it?  Basic Concepts  Broadcasting Algorithm  Topology Construction  Ontology Based.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
Visual Querying By Color Perceptive Regions Alberto del Bimbo, M. Mugnaini, P. Pala, and F. Turco University of Florence, Italy Pattern Recognition, 1998.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Query Planning for Searching Inter- Dependent Deep-Web Databases Fan Wang 1, Gagan Agrawal 1, Ruoming Jin 2 1 Department of Computer.
A Topology-based ECO Routing Methodology for Mask Cost Minimization Po-Hsun Wu, Shang-Ya Bai, and Tsung-Yi Ho Department of Computer Science and Information.
Chapter 4: Computer Networks Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
CAD/Graphics 2013, Hong Kong Footpoint distance as a measure of distance computation between curves and surfaces Bharath Ram Sundar*, Abhijit Chunduru*,
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
What is a Topology? The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should.
Information Technology Lecture No 3 By: Khurram Shahid.
Network Aware Resource Allocation in Distributed Clouds.
9 1 SIT  Today, there is a general consensus that in near future wide area networks (WAN)(such as, a nation wide backbone network) will be based on.
David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering.
Chapter 5 Trajectory Planning 5.1 INTRODUCTION In this chapters …….  Path and trajectory planning means the way that a robot is moved from one location.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Migration Motif: A Spatial-Temporal Pattern Mining Approach for Financial Markets Xiaoxi Du, Ruoming Jin, Liang Ding, Victor E. Lee, John H.Thornton Jr.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
The Cartesian Coordinate System and Linear Equations in Two Variables
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Leonardo Guerreiro Azevedo Geraldo Zimbrão Jano Moreira de Souza Approximate Query Processing in Spatial Databases Using Raster Signatures Federal University.
Course 11 Optical Flow. 1. Concept Observe the scene by moving viewer Optical flow provides a clue to recover the motion. 2. Constraint equation.
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented.
Section 1.1 Rectangular Coordinates; Graphing Utilities; Introduction to Graphing Equations.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
1 Motion Analysis using Optical flow CIS601 Longin Jan Latecki Fall 2003 CIS Dept of Temple University.
NETWORKS.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
A New Link Scheduling Algorithm for Concurrent Tx/Rx Wireless Mesh Networks Author: Kwan-Wu Chin University of Wollongong, Australia From: ICC 2008 Speaker:
Maze Routing Algorithms with Exact Matching Constraints for Analog and Mixed Signal Designs M. M. Ozdal and R. F. Hentschke Intel Corporation ICCAD 2012.
Section 9.1 Arc Length. FINDING THE LENGTH OF A PLANE CURVE Divide the interval [a, b] into n equal subintervals. Find the length of the straight line.
Graphs. Introduction Graphs are a collection of vertices and edges Graphs are a collection of vertices and edges The solid circles are the vertices A,
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
March 3, 2009 Network Analysis Valerie Cardenas Nicolson Assistant Adjunct Professor Department of Radiology and Biomedical Imaging.
Graphs Definition: a graph is an abstract representation of a set of objects where some pairs of the objects are connected by links. The interconnected.
Introduction to NP Instructor: Neelima Gupta 1.
1 8puzzle. 2 A* search algorithm A* is a best-first, graph search algorithm that finds the least-cost path from a given initial node to one goal node.
Physical Network Topology. When working with a network What is Physical Topology????? The physical topology of a network refers to the configuration of.
A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8.
Confidential & Proprietary – All Rights Reserved Internal Distribution, October Quality of Service in Multimedia Distribution G. Calinescu (Illinois.
Graphs and Applications of Linear Equations
Constraint-Based Routing
Computer Network Topology
Dijkstra’s shortest path Algorithm
Distance and Midpoint In The Coordinate Plane
Graphing in the Coordinate Plane
Coverage and Connectivity in Sensor Networks
Physical Network Topology
The University of Adelaide, School of Computer Science
Objective - To graph ordered pairs on the coordinate plane.
Rectangular Coordinates; Introduction to Graphing Equations
The Distance & Midpoint Formulas
Graphs G = (V,E) V is the vertex set.
Presentation transcript:

1 Detecting Spatially- Close Fiber Segments in Optical Networks Farabi Iqbal Stojan Trajanovski Fernando Kuipers (Delft University of Technology) 16 March 2016

2 Our Contributions Fast polynomial-time algorithms for detecting all spatially-close fiber segments. I II Fast polynomial-time algorithm for detecting the intervals of a fiber that are spatially-close to another fiber (or to a set of fibers). III Fast exact algorithm for grouping spatially-close fibers using a minimum number of risk groups.

3 Problem I Detection of Spatially-Close Fiber Segments: Given a set of fibers, find all the fiber segment pairs that have a minimum distance of less than ∆.

4 Spatially-close fiber segments have a high chance of failing simultaneously in the event of disasters. Yet, previous network resilience research often disregarded the geography of the fiber segments and considered all links to be straight. Motivation

5 Fiber Representation Non-straight concatenation of multiple fiber segments with irregular lengths. Each fiber segment is a straight line connecting two fiber points of known geodetic location.

6 Proposed Algorithms 1 2 R tree based k-d tree based

7 Proof-of-Concept Tested on three real-world topologies. Coordinates projected onto 2D Cartesian plane. Significant time-savings can be achieved by our proposed algorithms, particularly when ∆ is low.

8 Problem II Spatially-Close Intervals: Given a fiber and a set of other fibers, find the intervals of the fiber that are spatially close to any fiber in the fiber set.

9 Motivation Fibers with longer spatially-close intervals have higher risk of failing simultaneously.

10 Proof-of-Concept We propose an algorithm based on the use of line equations and union function to compute the spatially- close interval. Can further be fasten by combining fiber segments with collinear fiber points. Combining short non-collinear fiber segments saves running time at the expense of inaccurate results.

11 Problem III Risk Group Assignment: Given a set of spatially-close fiber pairs, assign fibers that are spatially close to each other in the same risk group, using the minimum number of groups.

12 Motivation A risk group is a set of fibers that are spatially close to every other fiber in the same set. Focus on maximal risk groups, such that the number of risk groups used is reduced.

13 An auxiliary graph for representing spatially-close fibers, with each auxiliary node representing a fiber. If any two fibers have a distance of less than ∆, connect their corresponding nodes with a link. Each maximal clique in the auxiliary graph then represents a maximal risk group. Proposed Algorithm

14 Proof-of-Concept Higher ∆ increases the number of spatially-close fibers and risk groups. However, as the size of risk groups increases, the possibility of a maximal risk group being a superset of another smaller risk group increases, thus reducing the number of maximal risk groups.

15 Conclusions Our proposed algorithms far outperforms the intuitive naive approach in finding all spatially-close fiber segments. Spatially-close intervals can be used to differentiate spatially-close fibers. Our risk group assignment also enables ample knowledge of existing risk-group-disjoint paths to find disaster-disjoint paths.

16 Thank You!